cyber security Crossword Puzzles

Viajar 2023-03-10

Viajar crossword puzzle
Across
  1. to land
  2. exit
  3. counter
  4. to board
  5. luggage
  6. pilot
  7. passenger
  8. aisle
  9. suitcase
  10. customs
Down
  1. window
  2. seat
  3. airline
  4. security
  5. flight
  6. plane
  7. to take off
  8. arrival
  9. ticket

19 Clues: seatexitplanepilotaislewindowflightticketto landairlinecounterluggagearrivalcustomssecurityto boardsuitcasepassengerto take off

Refugee 2022-12-06

Refugee crossword puzzle
Across
  1. redrob
  2. retlehs
  3. sserts
  4. ytiruces
  5. yrtnuoc
  6. eegufer
  7. noitairtaper
  8. ytilitsoh
  9. enimaf
  10. noitargimmi
  11. decalpsid
  12. epacse
  13. sudoxe
Down
  1. ssensselemoh
  2. seitlausac
  3. noitucesrep
  4. yrautcnas
  5. noitatroped
  6. noitargim
  7. enitnarauq
  8. sisirc
  9. RCHNU
  10. eeucave

23 Clues: RCHNUredrobssertssisircenimafepacsesudoxeretlehsyrtnuoceegufereeucaveytirucesyrautcnasnoitargimytilitsohdecalpsidseitlausacenitnarauqnoitucesrepnoitatropednoitargimmissensselemohnoitairtaper

vamos a viaje 2023-02-02

vamos a viaje crossword puzzle
Across
  1. gate
  2. suitcase
  3. to takeoff
  4. arrival
  5. to land
  6. passenger
  7. to travel
  8. vacation
  9. ticket
  10. passport
Down
  1. call somebody
  2. identification
  3. monitor or screen
  4. luggage
  5. to board
  6. security
  7. itinerary
  8. airport
  9. departure
  10. flight

20 Clues: gateticketflightluggageairportarrivalto landsuitcaseto boardsecurityvacationpassportitinerarydeparturepassengerto travelto takeoffcall somebodyidentificationmonitor or screen

E 2024-05-17

E crossword puzzle
Across
  1. - bevestigd
  2. - beheerder
  3. - beschouw
  4. - flierefluiten
  5. - genezen
  6. - afhankelijk
  7. - beveiliging
  8. - aankondiging
  9. - flexibiliteit
  10. - been
  11. - eschikbare
  12. - Bediening
Down
  1. - bereidtzichop
  2. - afstand
  3. - aanzienlijk
  4. - benodige
  5. - aanwezig
  6. - uitgevoerde
  7. - geschikte
  8. - Algemeen
  9. ogni parola inglese
  10. - behendigheid

22 Clues: - been- afstand- genezen- beschouw- benodige- aanwezig- Algemeen- bevestigd- beheerder- geschikte- Bediening- eschikbare- aanzienlijk- uitgevoerde- afhankelijk- beveiliging- aankondiging- behendigheid- bereidtzichop- flierefluiten- flexibiliteitogni parola inglese

Buffet de vocabulaire: Bon voyage page 8 2025-10-26

Buffet de vocabulaire: Bon voyage page 8 crossword puzzle
Across
  1. security
  2. luggage check
  3. airport
  4. plane
  5. terminal
  6. information
  7. track
  8. flight
  9. to land
Down
  1. newsstand
  2. platform
  3. to take off
  4. to declare
  5. compartment
  6. luggage
  7. snack bar
  8. restrooms
  9. counter
  10. seat
  11. customs

20 Clues: seatplanetrackflightairportluggagecountercustomsto landplatformsecurityterminalnewsstandsnack barrestroomsto declareto take offcompartmentinformationluggage check

Whatsapp in the news bbc 2025-06-17

Whatsapp in the news bbc crossword puzzle
Across
  1. The right to keep personal information secure and confidential.
  2. The process of converting data into a coded format to protect privacy.
  3. The parent company of WhatsApp, involved in the legal fight over encryption.
Down
  1. A popular messaging app known for its end-to-end encryption.
  2. The entity seeking access to encrypted user data in this legal case.
  3. Measures taken to protect information from unauthorized access.
  4. Short for "Technical Capability Notice," a secret government request for data access.
  5. The tech giant currently battling the UK Home Office over data security.
  6. End-to-end encryption, a security method preventing third-party access to messages.
  7. Apple’s cloud storage service that uses encryption for data security.

10 Clues: A popular messaging app known for its end-to-end encryption.Measures taken to protect information from unauthorized access.The right to keep personal information secure and confidential.The entity seeking access to encrypted user data in this legal case.Apple’s cloud storage service that uses encryption for data security....

Privacy and security 2018-11-14

Privacy and security crossword puzzle
Across
  1. This is when someone is calling or emailed you and tries to get you to sign up for something to get your personal info.
  2. when the sims 4 game is ______ it becomes all pixelated.
  3. This is when someone has you identity.
  4. Usually ______ are hacked because they have the most personal info
  5. Students learn strategys on how to protect there online ______________ for something.
  6. if you have a strong ______ you will most likely not be hacked
  7. How many people where effected when Facebook was hacked.
Down
  1. how many adults have been hacked in 2018
  2. Who need to learn about this so there future isn't affected?
  3. When repetitive emails are sent telling you that you won something and want you to do something.
  4. This is a statement or legal document explaining how the party/company is using your information.
  5. when people are hacked because of weak passwords their_________.
  6. if there where _______ to teach people how to stay safe; more people would not be hacked
  7. So many people are hacked because they are _______.
  8. What was the year that the most people where hacked

15 Clues: This is when someone has you identity.how many adults have been hacked in 2018So many people are hacked because they are _______.What was the year that the most people where hackedwhen the sims 4 game is ______ it becomes all pixelated.How many people where effected when Facebook was hacked....

Ukraine Food Security 2022-10-26

Ukraine Food Security crossword puzzle
Across
  1. Goods sent out of a country
  2. Relating to the government or affairs of a country
  3. Conflict between different countries
  4. Being provided with the necessary food for growth
  5. Resources given to aid others
  6. How much something costs
  7. Not enough of something (food)
  8. Current leader of Russia
  9. The country currently in need of help
Down
  1. Not having enough of/the right food
  2. The state of being stable, regarding to food
  3. Hostile actions to another
  4. Someone/a family being forced to leave their home
  5. When you help someone, you provide them with your ...
  6. Something of a high cost

15 Clues: How much something costsSomething of a high costCurrent leader of RussiaHostile actions to anotherGoods sent out of a countryResources given to aid othersNot enough of something (food)Not having enough of/the right foodConflict between different countriesThe country currently in need of helpThe state of being stable, regarding to food...

Ukraine Food Security 2022-11-01

Ukraine Food Security crossword puzzle
Across
  1. Relating to the government or affairs of a country
  2. Not enough of something (food)
  3. Goods sent out of a country
  4. Someone/a family being forced to leave their home
  5. Current leader of Russia
  6. Conflict between different countries
  7. Something of a high cost
  8. Being provided with the necessary food for growth
Down
  1. Resources given to aid others
  2. Not having enough of/the right food
  3. The country currently in need of help
  4. Hostile actions to another
  5. When you help someone, you provide them with your ...
  6. How much something costs
  7. The state of being stable, regarding to food

15 Clues: How much something costsCurrent leader of RussiaSomething of a high costHostile actions to anotherGoods sent out of a countryResources given to aid othersNot enough of something (food)Not having enough of/the right foodConflict between different countriesThe country currently in need of helpThe state of being stable, regarding to food...

Ukraine Food Security 2022-11-01

Ukraine Food Security crossword puzzle
Across
  1. Relating to the government or affairs of a country
  2. Not enough of something (food)
  3. Goods sent out of a country
  4. Someone/a family being forced to leave their home
  5. Current leader of Russia
  6. Conflict between different countries
  7. Something of a high cost
  8. Being provided with the necessary food for growth
Down
  1. Resources given to aid others
  2. Not having enough of/the right food
  3. The country currently in need of help
  4. Hostile actions to another
  5. When you help someone, you provide them with your ...
  6. How much something costs
  7. The state of being stable, regarding to food

15 Clues: How much something costsCurrent leader of RussiaSomething of a high costHostile actions to anotherGoods sent out of a countryResources given to aid othersNot enough of something (food)Not having enough of/the right foodConflict between different countriesThe country currently in need of helpThe state of being stable, regarding to food...

Information Security Crossword 2025-09-03

Information Security Crossword crossword puzzle
Across
  1. principle of keeping data accurate and unchanged. (9 letters)
  2. program that spreads by attaching to files. (5 letters)
  3. secret used to access systems. (8 letters)
  4. security item to secure doors. (5 letters)
  5. designed to damage or disrupt. (7 letters)
  6. accounts with two or more verification steps. (3 letters)
  7. document defining how data is handled. (6 letters)
Down
  1. who gains unauthorized access. (6 letters)
  2. review of systems for compliance and risks. (5 letters)
  3. information unreadable without a key. (11 letters)
  4. control that limits who can see or use data. (9 letters)
  5. messages used to trick people into giving data. (8 letters)
  6. hidden malicious program disguised as useful. (6 letters)
  7. where someone pretends to be another user. (11 letters)
  8. systems and networks from attacks. (10 letters)

15 Clues: who gains unauthorized access. (6 letters)secret used to access systems. (8 letters)security item to secure doors. (5 letters)designed to damage or disrupt. (7 letters)systems and networks from attacks. (10 letters)information unreadable without a key. (11 letters)document defining how data is handled. (6 letters)...

The Final 2025-08-20

The Final crossword puzzle
Across
  1. ein áleypari (bæði á vøllinum og uttanfyri)
  2. The Final. Attack on Wembley is a ?
  3. The safest _____ was England losing
  4. málscorari
  5. verjuleikari
  6. Player focused on free school meals Marcus ?
  7. The England team missed three ?
  8. ____ guard
  9. the sport
  10. what the stadium went into when the pressure from fans was at its highest
  11. a plan
  12. number of years between each of the England finals
Down
  1. the players came from different ?
  2. It´s _____ home
  3. Feeling it gives fans when their team wins
  4. Feeling fans get when they cannot enter the stadium
  5. Feel an _____ rush
  6. Wembley is the ____ stadium of England
  7. word used when security cannot control an entrance

19 Clues: a planthe sportmálscorari____ guardverjuleikariIt´s _____ homeFeel an _____ rushThe England team missed three ?the players came from different ?The Final. Attack on Wembley is a ?The safest _____ was England losingWembley is the ____ stadium of EnglandFeeling it gives fans when their team winsein áleypari (bæði á vøllinum og uttanfyri)...

Delirium section 2 2015-05-04

Delirium section 2 crossword puzzle
Across
  1. A solution to a sickness.
  2. A building on a farmstead.
  3. A live music show.
  4. A Word for security watching people.
  5. Library of approved books.
  6. The name for the disease of love.
  7. Library of authorized music.
  8. People who live in the wilds.
  9. The main characters best friend.
  10. University of ______
  11. The color of a storm cloud.
  12. Main character.
Down
  1. A time set for someone to be home.
  2. Group of people who patrol the streets after curfew.
  3. Separation of people based on prejudice.
  4. Alex has a 3 pronged ____ on the side of his head.
  5. A place where science experiments are conducted.
  6. Lena's aunts name.
  7. A vision you have while sleeping.
  8. Security guard who catches Lena and Hana.

20 Clues: Main character.A live music show.Lena's aunts name.University of ______A solution to a sickness.A building on a farmstead.Library of approved books.The color of a storm cloud.Library of authorized music.People who live in the wilds.The main characters best friend.The name for the disease of love.A vision you have while sleeping....

MLK Community Trivia 2023-11-11

MLK Community Trivia crossword puzzle
Across
  1. main street nearest this location
  2. feeder Middle School to East High
  3. thriving neighborhood fitness center
  4. friendly Youth Services Manager
  5. resource center filled with literature
  6. Community nickname
  7. Harley Field is located here
  8. assist students w/ schoolwork and STEM activities
  9. education center for 9th - 12th grade
Down
  1. Dr. King's name
  2. referred to as "Unk" or "Uncle" at the branch
  3. largest park near MLK Library
  4. our comedic male security officer
  5. can be found engaging with teens
  6. the MLK "TikTok" Queen
  7. MLK Branch manager
  8. the next educational level after high school
  9. motherly, nurturing security officer
  10. works mostly with children at MLK
  11. local rec & community center
  12. person most likely in School Help Center
  13. GO BUCKS!

22 Clues: GO BUCKS!Dr. King's nameMLK Branch managerCommunity nicknamethe MLK "TikTok" Queenlocal rec & community centerHarley Field is located herelargest park near MLK Libraryfriendly Youth Services Managercan be found engaging with teensmain street nearest this locationour comedic male security officerfeeder Middle School to East High...

Financial Fundamentals 2023-05-24

Financial Fundamentals crossword puzzle
Across
  1. Rate of ________ is the relationship between the amount received and cost of investment
  2. Regulates bank deposits
  3. _________ tax is based on land and buildings
  4. _______ system shows the relationships between individuals, businesses, and governments
  5. Trade _______ is bad for the economy; buying things outside of the country
  6. A short-term debt security (abbr)
  7. A rise in the general level of prices
  8. ______ price index is an index of the variation in prices paid by typical consumers for retail goods and other items.
  9. _______ Supply is the amount of money in circulation in an economy
  10. _______ Cash Flow is money expected to receive in the future
Down
  1. A security representing ownership in a corporation
  2. ________ Exchange Rate is the value of a country’s currency in relation to the value of the money in another country
  3. Regulates stock markets
  4. A security representing a loan issued by a business or government
  5. _______ rates are the cost of borrowing money
  6. Any item that serves as a method of payment
  7. _____ Insurance insures an individual against the risk of financial loss in case of death
  8. _______ markets are securities with maturities of greater than one year
  9. Trade _______ is good for the economy; trading out/paying for goods in country
  10. Regulates banks

20 Clues: Regulates banksRegulates bank depositsRegulates stock marketsA short-term debt security (abbr)A rise in the general level of pricesAny item that serves as a method of payment_________ tax is based on land and buildings_______ rates are the cost of borrowing moneyA security representing ownership in a corporation...

Terminology 2025-12-12

Terminology crossword puzzle
Across
  1. Internal resource for learning and development.
  2. Facility space containing equipment for cooling air/water using refrigerant.
  3. Personnel who accompany visitors or assets within a facility.
  4. We provide security and safety services
  5. System used for incident reporting and management.
  6. Safeguard people and locations to deliver on Meta's priorities, principles, and mission.
  7. The enclosure on the roof of a building that houses mechanical equipment.
  8. A silent alert signaling that a person is under threat.
  9. Microsoft's email and personal information manager application.
Down
  1. A sudden illness or injury requiring immediate attention.
  2. A highly secure, restricted area within Meta data centers where the destruction and sanitation of storage media devices take place.
  3. The internal knowledge base for Global Security Operations.
  4. Learning and development platform used for training courses.
  5. Main entry control point, often where visitors check in.
  6. Room where external network circuits enter the building (acronym).
  7. The main area in a facility where servers and network gear are housed.
  8. Consistent, regular routes and patterns followed by security personnel.
  9. Physical access control system software used to manage badge access.
  10. A room containing heat exchanger elements, often for HVAC.

19 Clues: We provide security and safety servicesInternal resource for learning and development.System used for incident reporting and management.A silent alert signaling that a person is under threat.Main entry control point, often where visitors check in.A sudden illness or injury requiring immediate attention....

40 Limited Edition 3IT 2014-09-30

40 Limited Edition 3IT crossword puzzle
Across
  1. food
  2. self-centered&egoistic
  3. orange bag
  4. batman
  5. never iron shirt
  6. socks on the floor
  7. upsized Lee
  8. last girl before boys
  9. bird nest
  10. rolling in the deep
  11. tallest girl
  12. the queen
  13. TicTac Santa
  14. 18/17
  15. Mr Tay's darling
  16. 154cm
  17. Keep calm and study
  18. opp. of white
  19. broken finger
Down
  1. wood
  2. bimbo
  3. bad hair day
  4. Ritchie
  5. keep calm and take MC
  6. sleeping beast
  7. 우빈
  8. 10+9 on the list
  9. downsized Han
  10. football team
  11. The devil
  12. Ting Xie artist
  13. name list
  14. Loudest girl
  15. hair very nice boy
  16. tallest boy
  17. his girlfriend
  18. cyber rapist
  19. wushu
  20. chatterbox
  21. ( x,y )

40 Clues: 우빈woodfoodbimbo18/17154cmwushubatmanRitchie( x,y )The devilname listbird nestthe queenorange bagchatterboxupsized Leetallest boybad hair dayLoudest girltallest girlTicTac Santacyber rapistdownsized Hanfootball teamopp. of whitebroken fingersleeping beasthis girlfriendTing Xie artistnever iron shirt10+9 on the listMr Tay's darlingsocks on the floor...

5 2024-07-06

5 crossword puzzle
Across
  1. Warrior Princess TV show.
  2. Classic arcade game.
  3. Pop princess Spears.
  4. Alternative rock band Pumpkins.
  5. Cult classic superhero movie.
  6. Cult classic cyber thriller.
  7. Popular khaki pants brand.
  8. James Cameron's epic romance.
  9. Virtual pet keychains.
  10. Early wireless handheld computer.
  11. Boy band New Kids on the Block.
  12. Scifi film with Keanu Reeves.
Down
  1. Pop icon with many hits.
  2. 3D optical illusion books.
  3. Early pagers for communication.
  4. Collectible milk caps game.
  5. Dark comedy crime film.
  6. Paranormal investigation TV show.
  7. Rapper known for "Gangsta's Paradise".
  8. Band fronted by Gwen Stefani.
  9. Collectible toy cars.
  10. TV show about a working-class family.
  11. Mitsubishi sports car model.
  12. Purple dinosaur children's show.
  13. Pop-punk band.

25 Clues: Pop-punk band.Classic arcade game.Pop princess Spears.Collectible toy cars.Virtual pet keychains.Dark comedy crime film.Pop icon with many hits.Warrior Princess TV show.3D optical illusion books.Popular khaki pants brand.Collectible milk caps game.Cult classic cyber thriller.Mitsubishi sports car model.Cult classic superhero movie....

Teka-Teki Silang kata serapan dan konjungsi 2025-09-15

Teka-Teki Silang kata serapan dan konjungsi crossword puzzle
Across
  1. salah satu di dari klausa itu adalah anak
  2. kata"sebelumnya"merupakan konjungsi
  3. memperkaya kosakata merupakan fungsi dari
  4. bisnis berasal dari bahasa
  5. peramban merupakan serapan dari kata
  6. kata"tetapi, melainkan"merupakan kata hubung
  7. kata"atau" merupakan konjungsi
  8. konjungsi merupakan kata...dalam suatu kalimat
  9. kata"terakhir" merupakan konjungsi
Down
  1. kata angka diserap dari bahasa
  2. adaptasi merupakan unsur serapan yang disesuaikan pada ejaan dan lafal
  3. kata siber diserap dari kata
  4. biarpun San meskipun termasuk subordinatif
  5. rekening adalah contoh kata serapan
  6. kata yang digunakan untuk menghubungkan frasa/klausa disebut konjungsi
  7. adi suka baca buku. Baca merupakan jenis kata serapan
  8. seperti dan seolah-olah termasuk subordinatif
  9. kata"guna"merupakan konjungsi
  10. dosen berasal dari bahasa Belanda yaitu
  11. bola berasal dari bahasa

20 Clues: bola berasal dari bahasabisnis berasal dari bahasakata siber diserap dari katakata"guna"merupakan konjungsikata angka diserap dari bahasakata"atau" merupakan konjungsikata"terakhir" merupakan konjungsirekening adalah contoh kata serapankata"sebelumnya"merupakan konjungsiperamban merupakan serapan dari katadosen berasal dari bahasa Belanda yaitu...

Cyber Threat Landscape 2024-04-04

Cyber Threat Landscape crossword puzzle
Across
  1. Pretending to be an employee that forgot their password
  2. Type of phishing scam that involves an email with phone number to call
  3. Using digital ads to deliver malware
  4. Cybercriminals send emails claiming to be from a reputable source
  5. Sending text messages containing malicious link
  6. Type of phishing attack that targets specific people or organizations through malicious emails
  7. Software designed to disrupt a device's normal operations without the user's knowledge
Down
  1. Type of authentication that uses multi-step account log in process that requires more than just a password
  2. Type of malware that prevents users from accessing their device and data
  3. Defrauding people over the phone
  4. Cybersecurity thret using QR codes to trick users
  5. Manipulated video, photo or audio recording that used AI to make it appear real
  6. Type of scam that an email appears to be sent for legitimate request

13 Clues: Defrauding people over the phoneUsing digital ads to deliver malwareSending text messages containing malicious linkCybersecurity thret using QR codes to trick usersPretending to be an employee that forgot their passwordCybercriminals send emails claiming to be from a reputable source...

Vocabulary 11A/ 11B 2014-11-30

Vocabulary 11A/ 11B crossword puzzle
Across
  1. slepkavība
  2. aplaupīt
  3. pieslēgties
  4. izdemolēt īpašumu
  5. kabatzaglis
  6. noķert zagli
  7. vīruss
  8. pielikums
  9. platjoslas internets
  10. nozagt
  11. noziegums
Down
  1. lejuplādēt
  2. tiešsaiste
  3. drošība
  4. meklēt
  5. portatīvais dators
  6. izdarīt noziegumu
  7. veikalu zaglis
  8. izdzēst
  9. atzīties

20 Clues: meklētvīrussnozagtdrošībaizdzēstaplaupītatzītiespielikumsnoziegumsslepkavībalejuplādēttiešsaistepieslēgtieskabatzaglisnoķert zagliveikalu zaglisizdarīt noziegumuizdemolēt īpašumuportatīvais datorsplatjoslas internets

Unit 16 2020-04-16

Unit 16 crossword puzzle
Across
  1. kirurg
  2. padi
  3. aksessuaar
  4. vahekäik
  5. reisiterminal
  6. karistus
  7. kohane
  8. turvalisus
  9. pagas
  10. kandik
  11. trahv
Down
  1. meditsiiniline
  2. ilmnema
  3. ürgne loodus
  4. reisi sihtkoht
  5. võõrastemaja
  6. kellekski saada tahtja
  7. mehaanik
  8. rabav
  9. loeng
  10. sadam

21 Clues: padirabavloengsadampagastrahvkirurgkohanekandikilmnemamehaanikvahekäikkaristusaksessuaarturvalisusürgne loodusvõõrastemajareisiterminalmeditsiinilinereisi sihtkohtkellekski saada tahtja

Лудкечпи 2020-03-10

Лудкечпи crossword puzzle
Across
  1. нарушитель защиты
  2. лэптоп
  3. осведомленность
  4. запутанный
  5. злоупотребление
  6. надёжность
  7. безопасность
  8. целостность данных
Down
  1. результат, проблема
  2. масса,куча
  3. доступность
  4. код,шифр
  5. цель
  6. финансовые средства
  7. последствие
  8. добиваться
  9. средства, имущество
  10. страшный
  11. опора
  12. быстрый

20 Clues: цельопоралэптопбыстрыйкод,шифрстрашныймасса,кучадобиватьсязапутанныйнадёжностьдоступностьпоследствиебезопасностьосведомленностьзлоупотреблениенарушитель защитыцелостность данныхрезультат, проблемафинансовые средствасредства, имущество

SS2 p.50 2020-11-02

SS2 p.50 crossword puzzle
Across
  1. lenig, soepel
  2. rijk
  3. gelegenheid
  4. persoonlijkheid
  5. mysterieus
  6. arm
  7. smoking
  8. veiligheid
  9. vijandig
  10. houding
  11. medaille
Down
  1. crimineel
  2. luxueus
  3. gebied
  4. helling
  5. meer
  6. vele
  7. eerste hulp
  8. opereren
  9. kennis
  10. bevroren
  11. vrouwelijk

22 Clues: armrijkmeervelegebiedkennisluxueushellingsmokinghoudingopererenbevrorenvijandigmedaillecrimineelmysterieusveiligheidvrouwelijkgelegenheideerste hulplenig, soepelpersoonlijkheid

1 2024-05-17

1 crossword puzzle
Across
  1. prepared
  2. substantial
  3. General
  4. suitable
  5. way
  6. leg
  7. conducted
  8. present
  9. flies
  10. agility
  11. required
Down
  1. security
  2. Available
  3. Control
  4. confirmed
  5. administrator
  6. wall
  7. announcement
  8. cured
  9. dependent
  10. distance
  11. flexibility
  12. consider

23 Clues: waylegwallcuredfliesGeneralControlpresentagilitysecuritypreparedsuitabledistanceconsiderrequiredAvailableconfirmedconducteddependentsubstantialflexibilityannouncementadministrator

Hispanic Heritage Month (airport edition) 2024-09-07

Hispanic Heritage Month (airport edition) crossword puzzle
Across
  1. Aviation
  2. Passport
  3. Welcome
  4. Bathroom
  5. Shoes
  6. Knives
  7. Belt
  8. Security
  9. Hello
  10. Goodmorning
Down
  1. Food
  2. Gate
  3. Pockets
  4. Drink
  5. Airplane
  6. Hat
  7. Please
  8. Thankyou
  9. Sharp
  10. Computer
  11. Airport
  12. Needles
  13. Baggage

23 Clues: HatFoodGateBeltDrinkShoesSharpHelloPleaseKnivesPocketsWelcomeAirportNeedlesBaggageAviationAirplanePassportThankyouBathroomComputerSecurityGoodmorning

Crucigrama del vocabulario de avión 2025-03-13

Crucigrama del vocabulario de avión crossword puzzle
Across
  1. tripulación
  2. maleta
  3. luggage
  4. despegar
  5. maletero
  6. desembarcar
  7. vuelo
  8. Aterrizar
  9. aéreolinea
  10. país
  11. inspeccionar
  12. mostrador
Down
  1. avión
  2. pasajera
  3. aduana
  4. reclamar
  5. demora
  6. destino
  7. pasaporte
  8. extranjero
  9. Salir
  10. boleto
  11. seguridad

23 Clues: paísaviónvueloSaliraduanamaletademoraboletoluggagedestinopasajerareclamardespegarmaleteropasaporteAterrizarseguridadmostradorextranjeroaéreolineatripulacióndesembarcarinspeccionar

Incarceron 2022-03-15

Incarceron crossword puzzle
Across
  1. rub or push
  2. dwdwqw
  3. dwddw
  4. wqddwqdwd
  5. wqdwdwq
  6. guards and security
  7. wqdd
  8. asdad
  9. adwqdw
  10. ddwwqd
Down
  1. szxZXx
  2. zDw
  3. az metal band
  4. unavoidable
  5. aszza
  6. wdwdq
  7. dww
  8. wqddw
  9. shake
  10. dqdw

20 Clues: zDwdwwwqdddqdwaszzadwddwwdwdqwqddwshakeasdadszxZXxdwdwqwadwqdwddwwqdwqdwdwqwqddwqdwdrub or pushunavoidableaz metal bandguards and security

Maslow's hierarchy of needs 2025-12-08

Maslow's hierarchy of needs crossword puzzle
Across
  1. установить
  2. неспособный
  3. безопасность
  4. улучшать
  5. внешний
  6. осведомленный
  7. иметь значение
  8. отличие
  9. искать
  10. ключевой
Down
  1. оценивать
  2. выбирать
  3. способный
  4. цитировать
  5. ценить
  6. поведение
  7. результат
  8. присущий
  9. свойственный
  10. директива
  11. использовать
  12. трудоустройство
  13. гарантировать

23 Clues: ценитьискатьвнешнийотличиевыбиратьулучшатьприсущийключевойоцениватьспособныйповедениерезультатдирективаустановитьцитироватьнеспособныйбезопасностьсвойственныйиспользоватьосведомленныйгарантироватьиметь значениетрудоустройство

Sustainability 2019-05-02

Sustainability crossword puzzle
Across
  1. beings
  2. Science
  3. Made
  4. test
  5. protection
  6. Goal
  7. World
  8. Agreement
  9. Security
Down
  1. Distructure
  2. environmental
  3. Chranabled
  4. Change
  5. Seeds
  6. Mammal
  7. Write

16 Clues: MadetestGoalSeedsWriteWorldbeingsChangeMammalScienceSecurityAgreementChranabledprotectionDistructureenvironmental

Sustainability 2019-05-02

Sustainability crossword puzzle
Across
  1. beings
  2. Science
  3. Made
  4. test
  5. protection
  6. Goal
  7. World
  8. Agreement
  9. Security
Down
  1. Distructure
  2. environmental
  3. Chranabled
  4. Change
  5. Seeds
  6. Mammal
  7. Write

16 Clues: MadetestGoalSeedsWriteWorldbeingsChangeMammalScienceSecurityAgreementChranabledprotectionDistructureenvironmental

Networking Concepts , Cyber Ethics 2025-06-15

Networking Concepts , Cyber Ethics crossword puzzle
Across
  1. Wide
  2. Privacy
  3. Access
  4. Manners
  5. Rules
  6. Connect
  7. Copying
Down
  1. Virus
  2. Internet
  3. Service
  4. Security
  5. Adress
  6. Device
  7. Stealing
  8. Harassment
  9. Local

16 Clues: WideVirusRulesLocalAccessAdressDevicePrivacyServiceMannersConnectCopyingInternetSecurityStealingHarassment

ord fra teksten 2025-08-25

ord fra teksten crossword puzzle
Across
  1. skinner
  2. omringet
  3. selskab
  4. medlem
  5. født
  6. farlig
  7. undvige
Down
  1. leder
  2. piger
  3. telefon
  4. bedstemor
  5. sikkerhed
  6. ben
  7. kabler
  8. tog
  9. gammel

16 Clues: bentogfødtlederpigermedlemkablergammelfarligskinnertelefonselskabundvigeomringetbedstemorsikkerhed

Chapter 2 Vocabulary 2022-09-07

Chapter 2 Vocabulary crossword puzzle
Across
  1. Security through domination
  2. ability to wield power independently
  3. The fundamental rules and norms of politics
  4. weak states that breaks down
  5. The ability of a state to carry out actions
  6. Political power concentrated to authority
  7. Ability to wield power to make people work
  8. States that have strong sovereignty
  9. tendency toward decentralisation
  10. Federalism that is not uniform
Down
  1. Combined political entities of state, regime, gov
  2. Power that is distributed to regional bodies
  3. Something recognised as right and proper
  4. States that have weak sovereignty
  5. Appeals on the laws they offer
  6. Using customs and age to justify
  7. Organisation that maintains a monopoly of violence
  8. Appeals by power or ideas
  9. Security through cooperation
  10. The leadership that runs the state

20 Clues: Appeals by power or ideasSecurity through dominationweak states that breaks downSecurity through cooperationAppeals on the laws they offerFederalism that is not uniformUsing customs and age to justifytendency toward decentralisationStates that have weak sovereigntyThe leadership that runs the stateStates that have strong sovereignty...

Cybersecurity Awareness 2023 2023-10-06

Cybersecurity Awareness 2023 crossword puzzle
Across
  1. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  2. Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
  3. Digital ______ is the ability to use digital technology and media effectively
  4. Illegal _____ of copyrighted material is often referred to as piracy
  5. Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  6. Cybersecurity awareness month
  7. Online commenter whose intent is to attack views expressed online; these attacks are often personal
  8. Many features in online _____ can expose players to predators
  9. A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
  1. A person who attempts to gain unauthorized access to computer systems
  2. _____ settings help control things like your profile, contact, and other information relating to your account
  3. Online harrassment
  4. A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
  5. ______ theft is a type of crime in which your private information is stolen and used for criminal activity
  6. Designed to detect and destroy computer viruses

15 Clues: Online harrassmentCybersecurity awareness monthDesigned to detect and destroy computer virusesMany features in online _____ can expose players to predatorsIllegal _____ of copyrighted material is often referred to as piracyA person who attempts to gain unauthorized access to computer systems...

ICSS Unit 6 2024-08-16

ICSS Unit 6 crossword puzzle
Across
  1. Data cleansing will eliminate data that are ________.
  2. DNC Registry allows one to opt out of receiving __________ calls and messages
  3. Operational _______ refers to business disruption as a result of data breach.
  4. Operational security is also known as _______ security.
  5. A common form of MFA is two-factor __________.
  6. What type of system is required to keep customers' data secure?
  7. One way to ethically gain customer data is through a ________ survey.
  8. DTMF will mask the tones so that attacker will not be able to decipher the _______ frequency of the credit card details that was keyed in.
Down
  1. ______ loggers steal login credentials and sensitive enterprise data.
  2. Patch updates could be delayed due to undiscovered __________ before a major software update.
  3. One of the consequences of security breach is ______ damage.
  4. Trojans are malicious programs disguised as ________ ones.
  5. PDDA stands for Personal Data ________ Act
  6. Telephony ______ of services attack is an attempt to make telephone system unavailable to users.
  7. Too much data is also known as data ______.
  8. They key concepts of PDPA are consent, reasonableness and ________.

16 Clues: PDDA stands for Personal Data ________ ActToo much data is also known as data ______.A common form of MFA is two-factor __________.Data cleansing will eliminate data that are ________.Operational security is also known as _______ security.Trojans are malicious programs disguised as ________ ones....

Transhumanizam - ponavljanje 2024-04-10

Transhumanizam - ponavljanje crossword puzzle
Across
  1. Postupak zamrzavanja sa svrhom očuvanja tkiva
  2. Kiborg, Cyber
  3. Pokret koji nastoji pomoću tehnologije iskorijeniti patnju živih bića
  4. Filozofski i znanstveni pokret koji zagovara korištenje trenutnih i novih tehnologija
Down
  1. Musk Osnivač SpaceX-a
  2. ... Života
  3. Moždani čip Elona Muska
  4. Popularizirao pojam transhumanizma u svom eseju

8 Clues: ... ŽivotaKiborg, CyberMusk Osnivač SpaceX-aMoždani čip Elona MuskaPostupak zamrzavanja sa svrhom očuvanja tkivaPopularizirao pojam transhumanizma u svom esejuPokret koji nastoji pomoću tehnologije iskorijeniti patnju živih bićaFilozofski i znanstveni pokret koji zagovara korištenje trenutnih i novih tehnologija

Digital Privacy Crossword 2024-10-16

Digital Privacy Crossword crossword puzzle
Across
  1. A document that explains how websites use your data
  2. Extra layer of security that requires a code
  3. Data scrambled for security
  4. Using fake accounts to access restricted content
Down
  1. Checking identity before giving access
  2. Hidden malware disguised as legitimate software
  3. Small text files that track your online activity
  4. Security software that scans for threats
  5. Technology that verifies you are human (used on websites)
  6. A service that masks your IP address

10 Clues: Data scrambled for securityA service that masks your IP addressChecking identity before giving accessSecurity software that scans for threatsExtra layer of security that requires a codeHidden malware disguised as legitimate softwareSmall text files that track your online activityUsing fake accounts to access restricted content...

nvs 2013-09-12

nvs crossword puzzle
Across
  1. 1
  2. 2
  3. 4
  4. 6
  5. 9
  6. 17
  7. 13
  8. 3
  9. 10
  10. 14
  11. 15
Down
  1. 11
  2. 16
  3. 5
  4. 8
  5. 7
  6. 12

17 Clues: 1245869371116171310141215

FLM NOVEMBER Crossword 2025-11-05

FLM NOVEMBER Crossword crossword puzzle
Across
  1. color for many discounts on this Friday
  2. tree associated with Canada
  3. bird with red chin
  4. "glad I get to enjoy this" *feeling*
  5. to trip & ____
  6. holiday on the fourth Thursday in November
  7. "rhymes with door hinge"
  8. accumulation of rain
Down
  1. online sale name for this Monday
  2. protects from sky's showers
  3. sport played on ice with brooms
  4. what Mariah Carey is frozen in until November 1st
  5. boil them, mash them, put them in a stew
  6. the color a popular song about demon hunting
  7. who you feel at home with
  8. what you go to Devil's lake to do in the fall
  9. changing colors seasonally
  10. popular fall gourd

18 Clues: to trip & ____bird with red chinpopular fall gourdaccumulation of rain"rhymes with door hinge"who you feel at home withchanging colors seasonallyprotects from sky's showerstree associated with Canadasport played on ice with broomsonline sale name for this Monday"glad I get to enjoy this" *feeling*color for many discounts on this Friday...

Black Friday 2025-11-19

Black Friday crossword puzzle
Across
  1. ; A good offer or a good price.
  2. ; Full of people.
  3. ; A time when things are cheaper.
  4. ; A person who buys something.
  5. ; Something that does not cost a lot of money.
  6. ; A group of people waiting.
Down
  1. Something that costs a lot of money.
  2. ; A price reduction.
  3. ; A place where you can buy things.
  4. Monday ; The online shopping day after Black Friday.
  5. mall ; A big building with many stores.

11 Clues: ; Full of people.; A price reduction.; A group of people waiting.; A person who buys something.; A good offer or a good price.; A time when things are cheaper.; A place where you can buy things.Something that costs a lot of money.mall ; A big building with many stores.; Something that does not cost a lot of money....

Black Friday 2025-11-19

Black Friday crossword puzzle
Across
  1. ; A good offer or a good price.
  2. ; Full of people.
  3. ; A time when things are cheaper.
  4. ; A person who buys something.
  5. ; Something that does not cost a lot of money.
  6. ; A group of people waiting.
Down
  1. Something that costs a lot of money.
  2. ; A price reduction.
  3. ; A place where you can buy things.
  4. Monday ; The online shopping day after Black Friday.
  5. mall ; A big building with many stores.

11 Clues: ; Full of people.; A price reduction.; A group of people waiting.; A person who buys something.; A good offer or a good price.; A time when things are cheaper.; A place where you can buy things.Something that costs a lot of money.mall ; A big building with many stores.; Something that does not cost a lot of money....

ISMS Introduction Puzzle 2022-03-13

ISMS Introduction Puzzle crossword puzzle
Across
  1. The organization shall evaluate the information security performance and the _______ of the ISMS
  2. Need to demonstrate leadership and commitment with respect to the ISMS
  3. In the risk treatment process, this document must be produced before formulating an information security treatment plan
  4. A potential cause of an unwanted incident, which may result in harm to a system or organization
  5. Combination of the probability of an event and its consequences
  6. The organization shall determine interested parties that are relevant to the ISMS and the requirements of these interested parties relevant to information security. the above statement is described under Clause x.x Understanding the needs and ______________of interested parties.
  7. The organization shall continually improve the __________________, adequacy and effectiveness of the ISMS.
Down
  1. Contains the control objectives and controls to help in the information security risk treatment process
  2. Ensuring that information is accessible only to those authorized to access
  3. Excluding any of the requirements specified in Clause 4 to 10 is not acceptable when an organization claims ______to this International Standard
  4. The organization shall ensure that the information security risk assessments produce consistent, valid and ________ results.
  5. Is conducted at planned intervals to ensure the suitability, adequacy and effectiveness of ISMS
  6. Shall be conducted by the organization at planned intervals to provide information on whether the ISMS conforms to the organization’s own requirements for its ISMS and the requirements of the ISO27001 standards.
  7. The organization shall determine the boundaries and applicability of the ISMS to establish its
  8. Documented information of external _______, determined by the organization to be necessary for the planning and operation of the ISMS, shall be identified as appropriate, and controlled

15 Clues: Combination of the probability of an event and its consequencesNeed to demonstrate leadership and commitment with respect to the ISMSEnsuring that information is accessible only to those authorized to accessThe organization shall determine the boundaries and applicability of the ISMS to establish its...

global food security cross word puzzle 2024-04-19

global food security cross word puzzle crossword puzzle
Across
  1. An adequate supply doesn't guarantee household food security. Focus on incomes, expenditures, markets, and prices. Factors: Purchasing power, income, transportation, and market infrastructures.
  2. Crucial for agriculture, requires sustainable management
  3. Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets.
  4. Focuses on nutrient intake and utilization by individuals. Influenced by care and feeding practices, food preparation, diet diversity, and intra-household food distribution. Determines nutritional status.
  5. Addresses the "supply side" of food security. Determined by food production, stock levels, and net trade. Includes domestic production, import capacity, and food stocks.
  6. the food crisis created awareness for food security and led to a formal institutional response globally. However, food availability through buffer stocks was considered enough for ensuring food security.
Down
  1. The first basic human necessity and everyone's fundamental right.
  2. leading international efforts to address the need that people around the world have for reliable sources of quality food.
  3. Long-term or persistent. Results from poverty and lack of resources. Addressed by long-term development measures.
  4. Importance of consistent access to food. Factors affecting stability: Adverse weather, political instability, and economic factors. Periodic inadequate access can lead to nutritional deterioration.
  5. When all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life.
  6. Altered weather patterns and agricultural productivity
  7. Foster Strategic Coordination-regional and global level to improve governance and to promote better allocation of resources.
  8. Invest in country-owned plans, aimed at channeling resources to well- designed and results-based programs and partnerships.
  9. evidence of increasing malnutrition among the children/females led to inclusion of nutrition also as an essential element of food security.

15 Clues: Altered weather patterns and agricultural productivityCrucial for agriculture, requires sustainable managementThe first basic human necessity and everyone's fundamental right.Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets....

Cyber Security Crossword By Mora Marcuzzi 2020-08-20

Cyber Security Crossword By Mora Marcuzzi crossword puzzle
Across
  1. diseñado para infiltrarse en su dispositivo sin su conocimiento.Son subrepticios y trabajan activamente en contra de los intereses de la persona atacada.
  2. correo electrónico no solicitado que recibe una persona.
  3. evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.
  4. infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
Down
  1. es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
  2. recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.

6 Clues: correo electrónico no solicitado que recibe una persona.evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador....

Chapter 5 - Everything Needs to Be Secured 2025-11-06

Chapter 5 - Everything Needs to Be Secured crossword puzzle
Across
  1. Data relating to an individual that can identify or locate them.
  2. Software designed to damage, disrupt, or steal data.
  3. HOMES Homes with sensors and connected devices, increasing security risks.
  4. DATA Corporate data that may contain secrets or patents.
  5. Ethical hacker who helps organizations strengthen their security.
Down
  1. Hacker who acts with malicious intent.
  2. OF UPGRADEABILITY IoT limitation where devices cannot be updated easily.
  3. SECURITY Fences, guards, CCTV, and gates used to protect corporate facilities.
  4. A network filtering system that blocks unauthorized access.
  5. HOTSPOT A risky Wi-Fi network where traffic is not encrypted.
  6. DEVICES Devices connected to the internet that collect and exchange data.
  7. A secure encrypted connection used when accessing insecure networks.
  8. Software that scans, detects, and removes malicious programs.

13 Clues: Hacker who acts with malicious intent.Software designed to damage, disrupt, or steal data.A network filtering system that blocks unauthorized access.DATA Corporate data that may contain secrets or patents.Software that scans, detects, and removes malicious programs.Data relating to an individual that can identify or locate them....

crossword puzzle 2021-05-20

crossword puzzle crossword puzzle
Across
  1. cyber hub is located in
  2. tourism provides changes which causes
  3. teet ka achar is a pickle made from _ tree
  4. tourism may change _ effects
Down
  1. old custom of people which is still followed
  2. famous epic mahabharata was written in this state
  3. bird santuary is located in
  4. traditional headgear worn by men
  5. women cover their head by

9 Clues: cyber hub is located inwomen cover their head bybird santuary is located intourism may change _ effectstraditional headgear worn by mentourism provides changes which causesteet ka achar is a pickle made from _ treeold custom of people which is still followedfamous epic mahabharata was written in this state

E-Safety 2013-12-09

E-Safety crossword puzzle
Across
  1. Usually a scam but can be used to advertise.
  2. bully A person that uses the internet to bully someone.
  3. Staying safe on-line.
  4. A popular social networking website.
  5. A scam to steal your information.
Down
  1. A person that steals your information.
  2. Keeps your information safe.
  3. Allows you to video chat.
  4. Attacks your computer.

9 Clues: Staying safe on-line.Attacks your computer.Allows you to video chat.Keeps your information safe.A scam to steal your information.A popular social networking website.A person that steals your information.Usually a scam but can be used to advertise.bully A person that uses the internet to bully someone.

Kelas 7.5_Keisha Sunjaya 2023-05-10

Kelas 7.5_Keisha Sunjaya crossword puzzle
Across
  1. memperoleh informasi yg tepat dan akurat merupakan damoak tik yg
  2. mendapatkan jaringan nama lainnya
  3. salah satu kartu untuk mengakses kesehatan
  4. privasi yg berhubungan dengan fisik seseorang
  5. proyek kolaborasi merupakan media sosial yg berbentuk
  6. contoh perdagangan e-commerce
Down
  1. keinginan untuk menyendiri
  2. semua kolaborasi yg di upayakan pasti di mediasi oleh
  3. salah satu pengaruh tik yaitu
  4. cyber bullying merupakan contoh dampak yg

10 Clues: keinginan untuk menyendirisalah satu pengaruh tik yaitucontoh perdagangan e-commercemendapatkan jaringan nama lainnyacyber bullying merupakan contoh dampak ygsalah satu kartu untuk mengakses kesehatanprivasi yg berhubungan dengan fisik seseorangsemua kolaborasi yg di upayakan pasti di mediasi oleh...

Informatika 2024-08-10

Informatika crossword puzzle
Across
  1. Salah satu game online popular
  2. salah satu aplikasi media sosial
  3. Ilmu yang berkaitan dengan pemodelan matematika dan penggunaan komputer untuk menyelesaikan masalah-masalah sains
Down
  1. Salah satu karakter dalam profil pelajar pancasila
  2. Penghitungan dengan menggunakan komputer
  3. Dunia Maya
  4. Salah satu aplikasi jual beli online
  5. Salah satu aplikasi penyedia layanan transportasi
  6. Seseorang yang tidak begitu mahir dalam bermain
  7. Pembelajaran secara online

10 Clues: Dunia MayaPembelajaran secara onlineSalah satu game online popularsalah satu aplikasi media sosialSalah satu aplikasi jual beli onlinePenghitungan dengan menggunakan komputerSeseorang yang tidak begitu mahir dalam bermainSalah satu aplikasi penyedia layanan transportasiSalah satu karakter dalam profil pelajar pancasila...

Kiley-bullying 2022-03-11

Kiley-bullying crossword puzzle
Across
  1. moment joking or making fun of someone
  2. someone standing and watching people get bullied
  3. hitting,spitting,punching
  4. someone who bully's people
  5. subject to aggressive pressure or intimidation.
Down
  1. name calling
  2. intended to provoke or make fun of someone in a playful way.
  3. online bullying

8 Clues: name callingonline bullyinghitting,spitting,punchingsomeone who bully's peoplemoment joking or making fun of someonesubject to aggressive pressure or intimidation.someone standing and watching people get bulliedintended to provoke or make fun of someone in a playful way.

crossword 2012-11-15

crossword crossword puzzle
Across
  1. artist with the highest number of views for his\her video on youtube (3)
  2. brand ambassador of sony cyber shot (7)
  3. logo 1 (7)
  4. a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
  5. highest grossing hollywood movie (6)
  6. one world many states (16)
  7. the ultimate driving machine (3)
  8. logo 4 (9)
  9. towards excellence (4)
Down
  1. full form of P&G (14)
  2. ceo of virgin atlantic (14)
  3. logo 2 (10)
  4. subsidiary company of adidas which makes sportswear, apparel and accessories (6)
  5. logo 3 (5)
  6. world's local bank (4)
  7. parent company of minute maid (8)

16 Clues: logo 1 (7)logo 3 (5)logo 4 (9)logo 2 (10)full form of P&G (14)world's local bank (4)towards excellence (4)one world many states (16)ceo of virgin atlantic (14)the ultimate driving machine (3)parent company of minute maid (8)highest grossing hollywood movie (6)brand ambassador of sony cyber shot (7)...

Eksplorasi Merdeka 2025-08-18

Eksplorasi Merdeka crossword puzzle
Across
  1. Warna biru pada Jalur Gemilang melambangkan __________.
  2. Tema Hari Kebangsaan 2025 ialah "Malaysia MADANI:Rakyat ___________"
  3. Menjadi tempat pengisytiharan kemerdekaan ialah __________.
  4. Rukun Negara mengandungi __________ prinsip.
  5. Perkataan “Merdeka” dilaungkan sebanyak __________ kali pada 31 Ogos 1957.
  6. Bapa Kemerdekaan Malaysia ialah __________.
Down
  1. Bulan sabit pada Jalur Gemilang melambangkan agama __________.
  2. Lagu "Negaraku" diambil daripada lagu negeri ___________.
  3. Lagu manakah mengandungi lirik "Alam cyber teknologi terkini"
  4. Warna putih pada Jalur Gemilang melambangkan __________.
  5. Lagu "Keranamu Malaysia" menyemai semangat __________.
  6. Sejarah kemerdekaan Malaysia bermula dengan penjajahan oleh kuasa __________.
  7. Bunga kebangsaan Malaysia ialah bunga __________.
  8. Jata Negara mengandungi __________ ekor harimau.
  9. Warna yang melambangkan warna diraja.
  10. Sambutan kemerdekaan pada tahun 2025 adalah kali ke-6_.

16 Clues: Warna yang melambangkan warna diraja.Bapa Kemerdekaan Malaysia ialah __________.Rukun Negara mengandungi __________ prinsip.Jata Negara mengandungi __________ ekor harimau.Bunga kebangsaan Malaysia ialah bunga __________.Lagu "Keranamu Malaysia" menyemai semangat __________.Warna biru pada Jalur Gemilang melambangkan __________....

Luke Nick and Harry 2022-04-27

Luke Nick and Harry crossword puzzle
Across
  1. The original form of a message
  2. The receptiveness and convenience of data
  3. A process of encryption named after a Roman Emperor
  4. A measure put in place to minimize threats
  5. Software that takes advantage of a flaw
  6. Fraudulent practice of getting personal information
  7. Files that have changed since last backup
  8. Preliminary experimentation on a system
Down
  1. Identifying and analyzing flaws
  2. Encryption that uses the same key
  3. Exposed to the possibility of an attack
  4. Magic happens after this process of plaintext
  5. Guessing all combinations until correct
  6. Restoring data
  7. A digital authentication of dependability: can verify authenticity.
  8. Simulating a potential cyber-barrage

16 Clues: Restoring dataThe original form of a messageIdentifying and analyzing flawsEncryption that uses the same keySimulating a potential cyber-barrageExposed to the possibility of an attackGuessing all combinations until correctSoftware that takes advantage of a flawPreliminary experimentation on a systemThe receptiveness and convenience of data...

SMG Crossword Puzzle 2025-12-15

SMG Crossword Puzzle crossword puzzle
Across
  1. - A large company or group
  2. a measure of a company’s stock price relative to
  3. average forecast for a companies forecast
  4. - is the highest price and the lowest price of the stock over a 52-week
  5. - A debt security issues by government
Down
  1. Price a company will fetch in the open market by investor perception
  2. - measures volatility as compared to the overall stock
  3. a short unique abbreviation representing a public trading company or security on stock exchange
  4. is a loan made by an issuer (borrower) to a lender (investor).
  5. is a broad group of stocks often in the same industry.
  6. - Type of bond that includes Debt security issued by state, cities or county,
  7. - Company total income for selling goods or services.
  8. earnings.
  9. basis- the original price paid for an asset is used to determine capital gain or loss

14 Clues: earnings.- A large company or group- A debt security issues by governmentaverage forecast for a companies forecasta measure of a company’s stock price relative to- Company total income for selling goods or services.- measures volatility as compared to the overall stockis a broad group of stocks often in the same industry....

INTERNET 2023-11-29

INTERNET crossword puzzle
Across
  1. service provider IPS
  2. engine google, yahoo, edge
  3. this device wraps up ur sTechnologyndy
Down
  1. web cyber_
  2. Revenue Service IRS
  3. old people have a hard time understanding
  4. a world that you join in Minecraft

7 Clues: web cyber_Revenue Service IRSservice provider IPSengine google, yahoo, edgea world that you join in Minecraftthis device wraps up ur sTechnologyndyold people have a hard time understanding

Choosing A Local Church 2025-03-03

Choosing A Local Church crossword puzzle
Across
  1. Leadership
  2. Program
  3. Godly
  4. Greeters
  5. Fellowship
  6. Believer's
  7. Separation
  8. Meeting
  9. Offering
  10. Scripture
Down
  1. Creed
  2. Evangelist
  3. Regular Memorial
  4. Great Commission
  5. Plan
  6. I Timothy
  7. Scriptural
  8. Fixing

18 Clues: PlanCreedGodlyFixingProgramMeetingGreetersOfferingI TimothyScriptureEvangelistLeadershipFellowshipBeliever'sSeparationScripturalRegular MemorialGreat Commission

SDLC 2024-10-22

SDLC crossword puzzle
Across
  1. Performed for ensuring that code changes do not introduce new vulnerabilities
  2. A type of testing that checks for vulnerabilities in the application
  3. The phase where security requirements are identified and documented.
  4. The process of converting source code into executable code
Down
  1. A security measure that involves reviewing code for vulnerabilities
  2. A practice of continuously integrating and testing code changes
  3. The final phase where the product is deployed to production.
  4. The phase where the system is monitored for security incidents.
  5. The phase where the system is designed, including security architecture.

9 Clues: The process of converting source code into executable codeThe final phase where the product is deployed to production.A practice of continuously integrating and testing code changesThe phase where the system is monitored for security incidents.A security measure that involves reviewing code for vulnerabilities...

Security Awareness Crossword Puzzle 2025-07-12

Security Awareness Crossword Puzzle crossword puzzle
Across
  1. What is the name of The Israeli Security Agency
  2. Which security device functions as a physical barrier to prevent forced entry of vehicles from entering restricted areas?
  3. LUX is the units of
  4. Any Aerial Threats across the land border by Fighter Planes or Missiles is delt by
Down
  1. Which Refinery unit received the Best Location Award-2024 for outstanding security practices
  2. Which country used DRONE for the first time for attack
  3. The colour of‘VIP VISITOR’ card is
  4. A mobile Application to grant permission online for DRONES
  5. The first line of defence in physical security is

9 Clues: LUX is the units ofThe colour of‘VIP VISITOR’ card isWhat is the name of The Israeli Security AgencyThe first line of defence in physical security isWhich country used DRONE for the first time for attackA mobile Application to grant permission online for DRONESAny Aerial Threats across the land border by Fighter Planes or Missiles is delt by...

IT Definitions Crossword 2013-12-02

IT Definitions Crossword crossword puzzle
Across
  1. Ways that are allowed behaviour on webpages that support an online community.
  2. Action, devices or events that harm components and/or data and security stored within.
  3. Contributes to the way a solution works and/or appears to the user
  4. Ways of making sure that a solution works the way it’s intended to work/be used for.
  5. A large internet based storage service that allows people to store data online and access anywhere with internet access.
  6. Ways information should be used and organised with onscreen solutions
  7. Software tools that allow people to figure out thoughts and find patterns in setting out data.
  8. A description of the/an intended use or environments of a software solution.
  9. A statement that outlines a situation, context, problem or needs.
  10. A type of software that can run an application without the user inputting the code.
  11. Are obligations that individuals or companies have to respect owner’s creations and privacy information.
Down
  1. A way of producing required information through a technology based hardware / application.
  2. Software or procedures used in protecting the integrity of hardware/component and/or the files it holds.
  3. Devices Equipment used in protecting hardware in a secure area.
  4. Measurements of time, cost, and/or effort used in order to create a solution
  5. A process of turning RAW data into a graphic visualisation for easier analysis and explanation
  6. A network protocol laid out into 7 layers.
  7. Ways to represent the was a solution works and/or appears to the user
  8. The combination of people, procedures, equipment and data that create data and information

19 Clues: A network protocol laid out into 7 layers.Devices Equipment used in protecting hardware in a secure area.A statement that outlines a situation, context, problem or needs.Contributes to the way a solution works and/or appears to the userWays information should be used and organised with onscreen solutions...

ASEAN 2023-09-13

ASEAN crossword puzzle
Across
  1. Negara ASEAN dengan jumlah penduduk paling sedikit
  2. Kejahatan cyber crime merupakan dampak dari kemajuan
  3. Negara ASEAN dengan gunungapi terbanyak selain Indonesia
  4. Sungai Irawadi terletak di negara
  5. Keputusan tertinggi rapat ASEAN
  6. Masalah sosial negara berkembang
Down
  1. Sungai yang mengaliri pertanian di negara China, Myanmar, Laos
  2. Salah satu Sekjen ASEAN berada di negara
  3. Merk mobil yang berasal dari negara Malaysia
  4. Perjanjian AFTA di tanda tangani di negara
  5. Pertemuan Defence Minister Meeting (ADMM)membahas tentang
  6. Sungai Chao Praya mengalir di negara
  7. Kenampakan alam di Kampuchea yaitu dataran lacustrine, terjadi karena
  8. Pakaian tradisional Vietnam
  9. Organisasi negara-negara kawasan Asia Tenggara

15 Clues: Pakaian tradisional VietnamKeputusan tertinggi rapat ASEANMasalah sosial negara berkembangSungai Irawadi terletak di negaraSungai Chao Praya mengalir di negaraSalah satu Sekjen ASEAN berada di negaraPerjanjian AFTA di tanda tangani di negaraMerk mobil yang berasal dari negara MalaysiaOrganisasi negara-negara kawasan Asia Tenggara...

Religion, renewal and choice 2020-11-02

Religion, renewal and choice crossword puzzle
Across
  1. The term used by Hervieu-Leger to describe the loss of collective memory (2 words, no space)
  2. Davies' term that reflected the fact the clergy practise religion on behalf of the majority, who experience religion second hand - ________ religion.
  3. ___________ Security Theory. Norris and Inglehart's theory that suggests wealth influences religiosity.
  4. The term used by Lyon to describe the fact that religious ideas no longer exist in physical churches only because of the media.
  5. The phrase used by Lyon that suggests that the world is not becoming rationalised, but instead is evolving and developing new unconventional beliefs, practices and spirituality.
  6. Hervieu-Leger's idea that religion has become individualised and we can select our own DIY beliefs that fit with our lives (2 words, no space)
  7. Refers to the growing interconnectedness of societies, which has led to greatly increased movements of ideas and beliefs across national boundaries.
Down
  1. The theoretical perspective that is explored and supported by the research and theories from this topic (beginning with P)
  2. The term used by Helland to describe the new forms of 'cyber-religion' that exist that challenge traditional, hierarchical religious ideas (2 words, no space)
  3. Religious _________ theory. The theory created by Stark and Bainbridge to explain the differences in secularisation in America and Europe.
  4. Cycle of _________. Term used by Stark and Bainbridge to explain why increasing diversity in religion does not have to lead to secularisation.
  5. The group Hervieu-Leger described as following an individual path of self-discovery and following New Age ideas.
  6. Stark and Bainbridge said this was key to ensure that religion remains influential in society (starts with S)
  7. Davies' term that reflected the fact that people still follow religion but don't necessarily join an organisation - believing without ___________

14 Clues: The term used by Hervieu-Leger to describe the loss of collective memory (2 words, no space)___________ Security Theory. Norris and Inglehart's theory that suggests wealth influences religiosity.Stark and Bainbridge said this was key to ensure that religion remains influential in society (starts with S)...

Collective Security & UN Peacekeeping 2018-02-13

Collective Security & UN Peacekeeping crossword puzzle
Across
  1. "The individual experts who have sat on the UN Sub-Commission on Protection of ______ ..." (pg. 245)
  2. Rights "The Security Council can Authorize a member state or regional organization to enforce _____" (pg. 195)
  3. Argued that peacekeeping is internal and external & makes the UN possible
  4. Scene of UN inaction and extreme violence
  5. "The UN's ___ reflects the ____ of the member states" (pg. 575)
  6. Site of UN peacekeeping as a result of British and French interests
  7. Attempt to cut off diplomatic or economic relations with a view towards altering offensive behavior (pg.61)
  8. Former political officer who shed light on the inner workings of UN decision making
  9. Concept that is through to undermine the efficiency of the UN. Used as a defense against UN action on human rights ( pg. 240)
  10. War A frigid conflict that bore peacekeeping
Down
  1. State that asked for UN assistance during the Cold War
  2. Timor UN administered territory during this entity's tradition ti independence (pg.105)
  3. An absence of centralized democratically elected governments, market economies, & the institutions associated with Western forms of governance (pg. 38)
  4. At times publicly protests governmental actions & provides assistance to refugees and contracts with NGOs (pg. 218)
  5. Security security arrangement, political, regional, or global, in which each state in the system accepts that the security of one is the concern of all, and therefore commits to a collective response to threats to, and breaches to peace
  6. Factor that contributed to the prioritization of UN needs over Rwanda (pg. 573)
  7. Tactic used by the UNGA and UNSC to target a specific actor or set of actors with the goal of changing actions or attitudes. Results of this are minimal due to the lack of coercive power attached to them ( pg. 199)
  8. Reflect interests of US Mission and Washington. Collateral damage is the production of indifference
  9. Author who's work details the origins, inner workings, responsibilities, and organizational powers of the UN
  10. Knowledge about human rights is not so much scientific knowledge, however as _______ judgement" (pg. 246)
  11. political "Peacekeeping" was created as much to salvage the UN from its ___ crises as it was to respond to threats to international peace and security" (pg. 31)
  12. One of many international entities dedicated to promoting and protecting human rights (acronym)

22 Clues: Scene of UN inaction and extreme violenceWar A frigid conflict that bore peacekeepingState that asked for UN assistance during the Cold War"The UN's ___ reflects the ____ of the member states" (pg. 575)Site of UN peacekeeping as a result of British and French interestsArgued that peacekeeping is internal and external & makes the UN possible...

MGR-22 CROSSWORD CONTEST 2022-08-22

MGR-22 CROSSWORD CONTEST crossword puzzle
Across
  1. An IBM Security product that helps security teams detect, prioritize and respond to threats across the enterprise
  2. This IBM Research tool allows scientists and businesses to search mountains of unstructured data
  3. IBM worked with __________ to create a scalable CRM platform, called Customer 360, which gives every part of IBM a holistic view into the client journey and cuts time to issue resolution by 26%
  4. “Never trust, always verify” is the first defining principle of which model
  5. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
  6. IBM’s acquisition of __________ will help clients secure critical assets across hybrid cloud environments—and stay one step ahead of attackers
  7. This aerospace manufacturer announced that open source, hybrid cloud, and AI technologies from IBM and Red Hat are part of its second mission
  8. One-way street to persisting top secrets
Down
  1. Decoy computers or systems that lure hackers and cybercriminals into attacking them
  2. For more than three decades, IBM has helped develop and deliver innovative and engaging digital fan experiences at the which tennis championships
  3. IBM and the Alliance to End Plastic Waste created ________, a global information platform to solve a waste data gap
  4. ensure the sensitive data is accessed only by an authorized user
  5. A Person who uses technology to gain unauthorized access to data is called a _____
  6. Recent IBM security acquisition of an endpoint security company.
  7. First computer worm(virus) programmed to move across a network, leaving a small trail (series of signs) wherever it went was _____
  8. The _____________ ransomware group was involved in the recent hacking of a networking giant by compromising an employee’s personal google account.
  9. Cross-site scripting standing in front of a mirror
  10. To avoid ____________, user input should not be put directly into a database
  11. Vast Strides –I help in identifying Security Vulnerabilities
  12. A form of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users
  13. A protocol used for directory services authentication that was first developed in 1993
  14. A group of protocols used to encrypt data between two communication points.

22 Clues: One-way street to persisting top secretsCross-site scripting standing in front of a mirrorVast Strides –I help in identifying Security Vulnerabilitiesensure the sensitive data is accessed only by an authorized userRecent IBM security acquisition of an endpoint security company....

CyberCrossWord 2022-05-19

CyberCrossWord crossword puzzle
Across
  1. Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
  2. The process of verifying an identity by or for a system
  3. Policy A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
  4. Code embedded in a program that copies itself and performs unwanted function
  5. The output of an encryption algorithm; the encrypted form of a message or data
  6. Assures that a system performs its intended function in an unimpaired manner
  7. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
  8. A potential security harm to an asset
  9. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
  10. Preserving authorized information access, or disclosure
  11. The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
  12. Assures that a system performs its intended function in an unimpaired manner
  13. A random value that is concatenated with a password
  14. A decoy system designed to lure a potential attacker away from critical systems
Down
  1. Confidentiality, integrity, and availability
  2. Assures that information and programs are changed only in a specified and authorized manner
  3. An attempt to alter system resources or affect their operation
  4. Attack An attempt to learn or make use of information from the system that does not affect system resources
  5. Guarding against improper information modification or destruction
  6. A program that takes over another computer and it's used to launch attacks
  7. Program that can replicate itself and send copies from computer to computer across network connections
  8. Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
  9. Assures that private information is disclosed to unauthorized individuals
  10. Weakness in an information system
  11. Function used to protect passwords that are stored in the local database
  12. A plastic card that can store and process data
  13. Assures that systems work promptly and service is not denied to authorized users
  14. A procedure whereby two communicating parties can cooperate to acquire a shared secret key
  15. Key A temporary encryption key used between two principals
  16. The conversion of plaintext data into unintelligible form

30 Clues: Weakness in an information systemA potential security harm to an assetConfidentiality, integrity, and availabilityA plastic card that can store and process dataA random value that is concatenated with a passwordThe process of verifying an identity by or for a systemPreserving authorized information access, or disclosure...

Stock market terms 2023-10-25

Stock market terms crossword puzzle
Across
  1. max number of shares a publicly traded company can issue as specified in its articles of incorporation
  2. the money borrowed from a broker to purchase an investment
  3. when investors buy ownership of the shares of the company
  4. a period of time in a financial markets when the price of an asset or security continuously
  5. an intermediary between an investor and a security exchange
  6. a reward paid to the shareholders for their investment in a company's equity
  7. a period of sustained increases in the prices of stocks, bonds, or related indexes
  8. an order to buy/sell at the markets current available price
  9. the lowest price at which a seller will sell the stock
  10. The highest price a buyer will pay for a number of shares
  11. the standard deviation of a stocks annualised returns
  12. filling a buy/sell order in the market subject to conditions placed on the order by the end client
  13. to close out a position in a stock b/c price decline
  14. long means you own the security
  15. The foreign exchange market
Down
  1. execute a trade at a specific price that expires if not completed
  2. an order to buy/sell with a restriction
  3. a pooled collection of assets that invests in stocks, bonds, and other securities
  4. a trading strategy where an individual buys and sells (or sells and buys) the same security in a margin account on the same day in an attempt to profit from small movements in the price of the security.
  5. Measure of volatility
  6. a marketplace where securities, commodities, derivatives and other financial instruments are traded.
  7. the amount by which the ask price exceeds the bid price for an asset in the market
  8. a declining market
  9. number of shares traded between its daily open and close
  10. When a company first sells a stock to the public
  11. total value of all a companies shares of stock
  12. purchasing additional shares of a previously initiated investment after the price dropped
  13. collection of financial investments
  14. a statistic that captures the average change in a data series over time
  15. how much income an investment generates, separate from the principal.

30 Clues: a declining marketMeasure of volatilityThe foreign exchange marketlong means you own the securitycollection of financial investmentsan order to buy/sell with a restrictiontotal value of all a companies shares of stockWhen a company first sells a stock to the publicto close out a position in a stock b/c price decline...

Stock market terms 2023-10-25

Stock market terms crossword puzzle
Across
  1. max number of shares a publicly traded company can issue as specified in its articles of incorporation
  2. the money borrowed from a broker to purchase an investment
  3. when investors buy ownership of the shares of the company
  4. a period of time in a financial markets when the price of an asset or security continuously
  5. an intermediary between an investor and a security exchange
  6. a reward paid to the shareholders for their investment in a company's equity
  7. a period of sustained increases in the prices of stocks, bonds, or related indexes
  8. an order to buy/sell at the markets current available price
  9. the lowest price at which a seller will sell the stock
  10. The highest price a buyer will pay for a number of shares
  11. the standard deviation of a stocks annualised returns
  12. filling a buy/sell order in the market subject to conditions placed on the order by the end client
  13. to close out a position in a stock b/c price decline
  14. long means you own the security
  15. The foreign exchange market
Down
  1. execute a trade at a specific price that expires if not completed
  2. an order to buy/sell with a restriction
  3. a pooled collection of assets that invests in stocks, bonds, and other securities
  4. a trading strategy where an individual buys and sells (or sells and buys) the same security in a margin account on the same day in an attempt to profit from small movements in the price of the security.
  5. Measure of volatility
  6. a marketplace where securities, commodities, derivatives and other financial instruments are traded.
  7. the amount by which the ask price exceeds the bid price for an asset in the market
  8. a declining market
  9. number of shares traded between its daily open and close
  10. When a company first sells a stock to the public
  11. total value of all a companies shares of stock
  12. purchasing additional shares of a previously initiated investment after the price dropped
  13. collection of financial investments
  14. a statistic that captures the average change in a data series over time
  15. how much income an investment generates, separate from the principal.

30 Clues: a declining marketMeasure of volatilityThe foreign exchange marketlong means you own the securitycollection of financial investmentsan order to buy/sell with a restrictiontotal value of all a companies shares of stockWhen a company first sells a stock to the publicto close out a position in a stock b/c price decline...

Tormentos - Bully free themed crossword puzzle 2025-12-08

Tormentos - Bully free themed crossword puzzle crossword puzzle
Across
  1. Abusive language or insults
  2. Showing behavior that is considerate of other people
  3. The feeling of being ashamed
  4. Displaying kindness or concern for others
Down
  1. To frighten someone
  2. bullying A name for digital bullying
  3. Not allowing someone or something to take part in a activity
  4. To give someone support or confidence
  5. Tormentos without the s

9 Clues: To frighten someoneTormentos without the sAbusive language or insultsThe feeling of being ashamedbullying A name for digital bullyingTo give someone support or confidenceDisplaying kindness or concern for othersShowing behavior that is considerate of other peopleNot allowing someone or something to take part in a activity

12 Days of Christmas ITHD Puzzle 2024-12-09

12 Days of Christmas ITHD Puzzle crossword puzzle
Across
  1. a link to something in a website.
  2. Collection of professional creative software made by Adobe.
  3. a secret word or phrase that must be used to gain admission to something.
  4. Prevents unauthorized access to a disk's contents, even if the disk is offline.
  5. Specialized computer or software designed to provide services, data or resources to other computers, over a network.
Down
  1. The practice of protecting devices, networks and programs from digital attacks.
  2. Creates a private connection between your computer and a remote server.
  3. The programs and other operating information used by a computer.
  4. Person who breaches computer security
  5. Group of devices connected within a limited area, such as a home, office or building.
  6. A network security device that monitors and filters incoming and outgoing network traffic based on an org's security policies.
  7. Programming error
  8. Unsolicited email
  9. Temporary data storage

14 Clues: Programming errorUnsolicited emailTemporary data storagea link to something in a website.Person who breaches computer securityCollection of professional creative software made by Adobe.The programs and other operating information used by a computer.Creates a private connection between your computer and a remote server....

Valentine's Security Crossword 2023-02-08

Valentine's Security Crossword crossword puzzle
Across
  1. Mixing cocoa, cocoa butter, milk and sugar= result.
  2. ____________ and a Gentleman
  3. Common candy heart phrase.
  4. The act of bringing something to an end.
  5. Small cherub that brings couples together.
  6. Main drive running east to west.
  7. Gene Simmons is the lead singer of this band since 1973.
  8. A ______ by any other name would smell as sweet.
  9. Rosa, Dianthus and Alstroemeria are the scientific names for?
Down
  1. The program for keeping eyes on all the things.
  2. Guests that enter the building as workers
  3. Visitors for success track days.
  4. Wifi __________ changes each month.
  5. Pumps about 1.5 gallons of blood every minute
  6. Second part of ILY

15 Clues: Second part of ILYCommon candy heart phrase.____________ and a GentlemanVisitors for success track days.Main drive running east to west.Wifi __________ changes each month.The act of bringing something to an end.Guests that enter the building as workersSmall cherub that brings couples together.Pumps about 1.5 gallons of blood every minute...

Robbery, Safety & Security 2021-10-21

Robbery, Safety & Security crossword puzzle
Across
  1. "The ____ is ready"
  2. _______ situation
  3. ________ Officer
  4. A robber is committing a _______
  5. You are supposed to _________ with the robber.
  6. Remain ____!
  7. listen _______
Down
  1. __________ location
  2. Always consult the Robbery __________
  3. _________ aka blackmail
  4. ____ Threat Procedures
  5. Ask _________
  6. color of your robbery book
  7. extortion phone ____
  8. ____ clear signal

15 Clues: Remain ____!Ask _________listen _______________ Officer_______ situation____ clear signal__________ location"The ____ is ready"extortion phone ________ Threat Procedures_________ aka blackmailcolor of your robbery bookA robber is committing a _______Always consult the Robbery __________You are supposed to _________ with the robber.

SECURITY AWARENESS PUZZLE 2023-09-20

SECURITY AWARENESS PUZZLE crossword puzzle
Across
  1. Acronym for the Central Intelligence Agency
  2. Classified material must never be stored in your office?
  3. Visitors must have an ___ at all times
  4. This must be worn at all times when entering, exiting and within all company locations
  5. Classified material must NEVER be brought to your?
  6. Acronym for Communications Security
  7. If an unauthorized individual has seen classified material the the material has been?
  8. This is any information that reflects unfavorably on the loyalty, integrity and character of employees who hold a security clearance
Down
  1. Access to classified information requires a clearance and a (3 words)
  2. AREA Name of the area in a facility where classified computer equipment is openly stored (two words)
  3. Acronym for a classified computer in a closed area
  4. An orange stripe on an visitor's badge indicates that the visitor is a?
  5. What does the acronym FOUO stand for?
  6. Acronym for Department of Defense?
  7. Where must classified documents be secured at the end of the workday?

15 Clues: Acronym for Department of Defense?Acronym for Communications SecurityWhat does the acronym FOUO stand for?Visitors must have an ___ at all timesAcronym for the Central Intelligence AgencyAcronym for a classified computer in a closed areaClassified material must NEVER be brought to your?Classified material must never be stored in your office?...

Information Security - Crossword 2024-03-25

Information Security - Crossword crossword puzzle
Across
  1. A security protocol that provides secure communication over a network, often used for remote access
  2. A type of authentication that verifies a user's identity based on physical characteristics
  3. A security measure that restricts access based on the principle of least privilege
  4. A cryptographic key that is kept secret and used for decrypting data
  5. A protocol used to secure email communication
  6. A program or device that identifies and authenticates a user's identity electronically
  7. An attack that involves intercepting and altering communication between two parties
  8. A method of encrypting data that uses a single key for both encryption and decryption
Down
  1. The act of tricking individuals into revealing sensitive information
  2. A type of attack that uses social engineering to manipulate individuals into taking specific actions
  3. A type of malware that hides its presence and can perform malicious actions without user knowledge
  4. A type of attack that floods a system with excessive traffic to disrupt normal operation
  5. A security incident response plan to restore systems and operations after an attack
  6. A technique used to ensure data integrity by creating a unique hash value for a file
  7. Software used to detect and prevent unauthorized access to a computer network

15 Clues: A protocol used to secure email communicationThe act of tricking individuals into revealing sensitive informationA cryptographic key that is kept secret and used for decrypting dataSoftware used to detect and prevent unauthorized access to a computer networkA security measure that restricts access based on the principle of least privilege...

Security Audit Quiz 2025-11-18

Security Audit Quiz crossword puzzle
Across
  1. The probability of a threat exploiting a vulnerability.
  2. NIST CSF function focused on safeguarding assets
  3. Final step of an audit process.
  4. Checking compliance to documented requirements.
  5. A weakness that can be exploited.
  6. A potential cause of an unwanted incident.
  7. Ability to track actions back to individuals or systems.
  8. U.S. body responsible for cybersecurity standards.
Down
  1. The defined boundary of an audit.
  2. measures implemented to reduce risk.
  3. Level of harm from a compromise.
  4. Unauthorized attempt to access a system.
  5. Critical element of CIA triad.
  6. Testing to confirm proper implementation.
  7. Adhering to required standards or regulations.

15 Clues: Critical element of CIA triad.Final step of an audit process.Level of harm from a compromise.The defined boundary of an audit.A weakness that can be exploited.measures implemented to reduce risk.Unauthorized attempt to access a system.Testing to confirm proper implementation.A potential cause of an unwanted incident....

CHAPTER 18 TERMS 2020-09-10

CHAPTER 18 TERMS crossword puzzle
Across
  1. Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
  2. contain events triggered by applications or programs determined by their programmers
  3. Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
  4. the facility to which the message refers.
  5. a device that test the speed of data transfer in the network.
  6. are used to determine whether your network meets specific International Organization for Standardization or Telecommunication Industry Association standards.
  7. detects unwanted attempts to manipulate network systems and/or environments
  8. a single digit code from 0 to 7 that indicates the severity of the message.
  9. most popular form of TCP scanning
  10. displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
  11. is a device that transmits signals through each wire copper twisted pair to determine if it is connected to the correct pin at the other end.
  12. used for sniffing wireless networks
  13. protocol analyzers such as load testing, connectivity testing, and throughput testing.
  14. contain events generated by Windows system component, including drivers and services that started or failed to start.
  15. the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
  16. analyzes protocols
  17. looks inside every packet on a network segment.
Down
  1. text string containing detailed information about the even being reported.
  2. the standard level of performance of a certain device or to the normal operating capacity for your whole network.
  3. date and time of a message.
  4. a text string that uniquely describes the message.
  5. a diagnostic procedure in which a signal is transmitted and returned to the sending device after passing through all or a portion of a network circuit.
  6. a powerful enterprise (large corporate environment) network intrusion and prevention system.
  7. a device that test the speed of data transfer in the network.
  8. contain security events like valid logon attempts and potential security problems
  9. a term for software products and services combining security information management and security event management.
  10. is a line tester designed to check a copper cable connection for basic installation problems like opens, shorts, and crossed pairs.
  11. stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
  12. sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
  13. a software tool designed to search a host for open ports.
  14. a combination cable tester and network analyzer, only better because it comes with more options.
  15. is a computer security device that monitors network and/or system activities for any strange or malicious behavior
  16. scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
  17. a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
  18. Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
  19. supports plaintext authentication with community strings and uses only UDP.
  20. an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.

37 Clues: analyzes protocolsdate and time of a message.most popular form of TCP scanningused for sniffing wireless networksthe facility to which the message refers.looks inside every packet on a network segment.a text string that uniquely describes the message.a software tool designed to search a host for open ports....

Chapter 3: Access Control 2014-10-22

Chapter 3: Access Control crossword puzzle
Across
  1. The absence or weakness of a safeguard that could be exploited.
  2. A subject provides some type of data to an authentication service. First step in the authentication process.
  3. An access policy that restricts subjects’ access to objects based on the security clearance of the subject and the classification of the object. The system enforces the security policy, and users cannot share their files with other users.
  4. A security principle that makes sure that information and systems are not modified maliciously or accidentally.
  5. Administrative, physical, or technical control that is designed to detect and prevent unauthorized access to a resource or environment.
  6. A list of subjects that are authorized to access a particular object. Typically, the types of access are read, write, execute, append, modify, delete, and create.
  7. A security principle that works to ensure that information is not disclosed to unauthorized subjects.
  8. Software employed to monitor and detect possible attacks and behaviors that vary from the normal and expected activity. The IDS can be network based, which monitors network traffic, or host based, which monitors activities of a specific system and protects system files and control mechanisms.
  9. When used within computer security, identifies individuals by physiological characteristics, such as a fingerprint, hand geometry, or pattern in the iris.
  10. A passive entity that contains or receives information. Examples include records, pages, memory segments, files, directories, directory trees, and programs.
  11. A form of attack in which an attacker uses a large set of likely combinations to guess a secret, usually a password.
  12. The reliability and accessibility of data and resources to authorized individuals in a timely manner.
  13. A chronological set of logs and records used to provide evidence of a system’s performance or activity that took place on the system. These logs and records can be used to attempt to reconstruct past events and track the activities that took place, and possibly detect and identify intruders.
  14. A security principle indicating that individuals must be identifiable and must be held responsible for their actions.
Down
  1. Granting access to an object after the subject has been properly identified and authenticated.
  2. A computer set up as a sacrificial lamb on the network in the hope that attackers will attack this system instead of actual production systems.
  3. An access control model and policy that restricts access to objects based on the identity of the subjects and the groups to which those subjects belong. The data owner has the discretion of allowing or denying others access to the resources it owns.
  4. To verify the identity of a subject requesting the use of a system and/or access to network resources. The steps to giving a subject access to an object should be identification, _____, and authorization.
  5. The three security principles: availability, integrity, and confidentiality.
  6. An attack that continually tries different inputs to achieve a predefined goal, which can be used to obtain credentials for unauthorized access.
  7. Type of model that provides access to resources based on the role the user holds within the company or the tasks that the user has been assigned.
  8. An active entity, generally in the form of a person, process, or device, that causes information to flow among objects or that changes the system state.

22 Clues: The absence or weakness of a safeguard that could be exploited.The three security principles: availability, integrity, and confidentiality.Granting access to an object after the subject has been properly identified and authenticated.A security principle that works to ensure that information is not disclosed to unauthorized subjects....

AWS Quiz III 2022-06-10

AWS Quiz III crossword puzzle
Across
  1. is an edge computing, data migration, and edge storage device that comes in two Options.
  2. is a cloud-based hardware security module that enables you to easily generate and use your own encryption keys on the AWS Cloud.
  3. is a highly available and scalable cloud Domain Name System (DNS) web service.
  4. provides a single location to track the progress of application migrations across multiple AWS and partner solutions
  5. is a service that enables customers to connect their Amazon Virtual Private Clouds (VPCs) and their on-premises networks to a single gateway
  6. is a data transfer service that makes it easy for you to automate moving data between on-premises storage and Amazon S3 or EFS.
  7. is an object storage service that offers industry-leading scalability, data availability, security, and performance.
  8. is a fully managed service that makes it easy for developers to create, publish,maintain, monitor, and secure APIs at any scale.
  9. lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily
  10. provides alerts and remediation guidance when AWS is experiencing events that might affect you.
  11. is a security service that uses machine learning to automatically discover, classify, and protect PII in S3 buckets.
  12. provides on-demand access to AWS’ security and compliance reports and select online agreements.
Down
  1. makes it easy to establish a dedicated network connection from your premises to AWS.
  2. running on AWS
  3. is a threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.
  4. gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.
  5. can migrate your data to and from most widely used commercial and open-source databases.
  6. is a managed Distributed Denial of Service (DDoS) protection service that safeguards web
  7. is a networking service that improves the availability and performance of the applications that you offer to your global users.
  8. enables you to build flexible, cloud-native directories for organizing hierarchies of data along multiple dimensions
  9. provides a unified user interface so you can view operational data from multiple AWS services and allows you to automate operational tasks across your AWS resources.
  10. is a service that makes it easy to develop, test, and deploy intelligent robotics applications at scale
  11. provides a simple, scalable, elastic file system for Linux-based workloads for use with AWS Cloud services and on-premises resources.
  12. is a networking service that helps establish secure connections between your on-premises networks,remote offices, client devices, and the AWS global network.
  13. is a hybrid storage service that allows your on-premises applications to seamlessly use AWS cloud storage.
  14. makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.
  15. is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
  16. helps you create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

28 Clues: running on AWSis a highly available and scalable cloud Domain Name System (DNS) web service.makes it easy to establish a dedicated network connection from your premises to AWS.is an edge computing, data migration, and edge storage device that comes in two Options....

Final Crossword 2025-06-11

Final Crossword crossword puzzle
Across
  1. A network device that can forward packets across different computer networks
  2. small number of passwords used when trying several different user accounts
  3. tool that provides a visual representation of the wireless signal
  4. A framework for transporting authentication protocols
  5. Having a high tolerance for risk
  6. A device that distributes resources and services to devices connected to the network
  7. An access control scheme that is the most restrictive
  8. A downgrade attack
  9. A systematic approach to dealing with transformations within an organization
  10. The retrieval of difficult-to-obtain data
  11. Threat intelligence data that has been legally gathered
  12. denial of the truth or validity of something
  13. Vulnerability for which there are no days of advanced warning
  14. Employee choose from company-approved devices
  15. Redirecting users to fake websites to steal data
  16. Installing software security updates
  17. replaces SSL
  18. A standard of normal activities
  19. A device that distributes work across a network
  20. Infecting frequented websites with malware
  21. bogus requests to overwhelm the recipient
  22. Addressing a risk by making the risk less serious
  23. Unnecessary ports that are not disabled
  24. A product that consolidates real-time security monitoring and management
  25. pay security researchers who uncover security bugs
  26. Using more than one type of authentication credential
  27. An AP set up by an attacker to mimic an authorized AP
  28. An attack in which threat actors introduce something into RAM
  29. retains historical documents
Down
  1. ensure critical data is protected
  2. server within the DMZ that is used to connect two dissimilar security zones
  3. Taking a “picture” of the state of the data repeatedly
  4. software embedded into hardware
  5. Isolating systems that have been compromised
  6. Simplifies the process of building, deploying, and managing containerized applications
  7. A device that maintains power to equipment in case of an interruption
  8. An certificate that uses an asterisk to cover multiple subdomains
  9. evidence or proof of something
  10. VM breaking out to interact with host OS
  11. Directly probing for vulnerabilities
  12. is a finite sequence of rigorous instructions
  13. A creative invention or work with rights
  14. digital fingerprints
  15. refers to integrating security into the application
  16. Combining two or more devices to appear as a single unit
  17. Numeric scores on a vulnerability
  18. captures and stores each keystroke that a user types on the computer’s keyboard
  19. The state or fact of something being likely or possible
  20. Tools that allow a device to be managed remotely by an organization
  21. A protocol suite for securing Internet Protocol (IP) communications
  22. use of technology without the knowledge of the official IT department
  23. A coding technique for accounting for errors
  24. An incident response testing exercise that is a monthly 30-minute discussion
  25. threat actor gains illicit access of elevated rights or privileges
  26. enables users to access a network resource through a directory service
  27. unauthorized copying of data
  28. Intentionally flooding the radio frequency spectrum
  29. Having little tolerance for risk
  30. isolate the failure of a server and storage resources from cloud users
  31. Procedures needed if a “roll back”
  32. Converting data into unreadable form for security

61 Clues: replaces SSLA downgrade attackdigital fingerprintsunauthorized copying of dataretains historical documentsevidence or proof of somethingsoftware embedded into hardwareA standard of normal activitiesHaving a high tolerance for riskHaving little tolerance for riskensure critical data is protectedNumeric scores on a vulnerability...

Financial Math 2021-09-20

Financial Math crossword puzzle
Across
  1. often offer to their employees in which they don't report to work
  2. - set amount of money that a worker receives for each item the individual produces.
  3. - The set number of hours that an employee is expected to work.
  4. covers only the individual to the extent outlined
  5. paid time off
  6. payroll tax deducted to fund the Social Security and Medicare programs
  7. formula to determine weekly benefits.
  8. total pay which is the sum of an employees hourlypay and overtime pay
  9. - the compensation that is paid to the owner of an asset based on income earned
  10. type of retirement plan where an employee receives compensation
  11. allows employees to buy or receive company stocks
  12. covers all members of the immediate family for health care bills to the extent outlined
  13. maximum income on which a person must pay social security tax in given year
  14. hourly rate that federal law allows as the least hourly rate
  15. paid time off to care for sick children or newborns.
  16. - work paid for according to the amount produced
  17. amount of social security a worker pays depends on the social security percentage and the maximum taxable income for that year
  18. - extra hours an employee works beyond their regular hours
  19. A government program that offers benefits to eligible employees who, through no fault on their own, have become unemployed
Down
  1. nine digit number that identifies a resident of united states
  2. - twice a month
  3. - provides income to people who retire, become disabled, or who receive survivors benefits.
  4. - The hourly rate an employee usually gets paid for overtime hours.
  5. employers may offer to save for retirement
  6. - Payroll or other types of checks that are directly and electronically deposited into a bank account.
  7. - every two weeks
  8. - what you are getting paid by hour
  9. Assistance to employees who are injured while working at their job
  10. An overtime rate that is two times the hourly rate.
  11. money that employers and employer contribute to social security and medicare
  12. - hourly wage an employee receives for any overtime hours.
  13. form of noncash compensation received in addition to a wage or salary
  14. - health, life, and disability
  15. - a fee paid for services, usually a percentage of the total cost
  16. employee pays is a set percentage of entire income with no maximum

35 Clues: paid time off- twice a month- every two weeks- health, life, and disability- what you are getting paid by hourformula to determine weekly benefits.employers may offer to save for retirement- work paid for according to the amount producedcovers only the individual to the extent outlinedallows employees to buy or receive company stocks...

Cyber-bullying Crossword 2023-05-04

Cyber-bullying Crossword crossword puzzle
Across
  1. Which foundation is run by the government
  2. About 50% of ----- students experience online harrassment
  3. Who are most affected by cyberbullying
  4. Cyberbullying is a ...
  5. Where is cyberbullying most found
  6. Who did we write our letter too
  7. Our global issue
Down
  1. What social media platform has the highest percentage of reported harassment
  2. “Being a victim of cyberbullying has a greater effect on adolescents’ -------- and suicidal ideation”
  3. Mental issues ----- with the use of social media
  4. Scott Freeman is the Founder of what Foundation
  5. Ross Ellis is the Founder of what Foundation
  6. What rates are tied to cyberbullying

13 Clues: Our global issueCyberbullying is a ...Who did we write our letter tooWhere is cyberbullying most foundWhat rates are tied to cyberbullyingWho are most affected by cyberbullyingWhich foundation is run by the governmentRoss Ellis is the Founder of what FoundationScott Freeman is the Founder of what Foundation...

CYBER FEST CROSSWORD 2025-01-23

CYBER FEST CROSSWORD crossword puzzle
Across
  1. Cybercrime that uses fake emails to trick people into people sharing personal information
  2. Digital currency
  3. Any type of harmful software designed to damage or disrupt a computer system
  4. a machine programmed by a computer capable of carrying out actions automatically
  5. a collection of instructions, data, or computer programs that enable a computer to perform specific tasks
  6. AI
  7. Common Gateway Interface
  8. an intentional act of compromising computer systems
Down
  1. VR
  2. Virtual computer world
  3. Characters used to verify identity
  4. Act of gaining access to a computer, database or system
  5. A global computer network

13 Clues: VRAIDigital currencyVirtual computer worldCommon Gateway InterfaceA global computer networkCharacters used to verify identityan intentional act of compromising computer systemsAct of gaining access to a computer, database or systemAny type of harmful software designed to damage or disrupt a computer system...

Digital citizenship 2018-08-25

Digital citizenship crossword puzzle
Across
  1. A program used to view webpages on the Internet; ex: Internet Explorer, Firefox, Safari or Chrome.
  2. A person who posts comments just to get a rise out of people and cause a distraction online.
  3. Being a member of and supporting your community and country. They have both rights and responsibilities.
  4. Is your right to determine what information you would like others to know about you.
  5. Using fake names, posing as someone else, or creating a fake profile about someone else.
  6. People who witness the actions of the bully and the reactions of the victim(s), without taking action.
  7. When someone tries to mislead the person into giving away information, such as a username, password or credit card details, by pretending to be a legitimate website when communicating electronically.
  8. Someone who accesses computer information without permission.
  9. The secret word you use when signing in to the Internet or an online service that helps to confirm your identity.
  10. More serious
  11. Physical, emotional and mental limits we set to protect ourselves from being manipulated, used, or harmed by others.
  12. Saying mean things in ALL CAPS with the intention to embarrass/humiliate.
  13. An extra (a second)layer of security
  14. The use of digital media tools such as the Internet and cell phones to deliberately and repeatedly hurt, harass, or embarrass someone else.
Down
  1. Information that can be used to identify you, such as your age, gender, how many brothers and sisters you have, your favorite food, address, telephone number, school, etc.
  2. The way something sounds and the feelings it expresses.
  3. To shut off another user's access to viewing your information on a social media site.
  4. A crime that happens when someone gets the personal information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money.
  5. To add a descriptive word, label, or phrase to a photo or video.
  6. A word you use when looking for information on a search engine (Google, Yahoo, etc).
  7. To annoy someone repeatedly. For example, cursing at, following, or mocking someone online.
  8. To change something that is written to make it better.
  9. Anyone who can see information about you or posted by you online.
  10. Bombarding someone with messages over digital media or repeated content when it is least expected.
  11. Less serious
  12. A graphic (picture, image) that you use to represent yourself on the Internet.
  13. Lasting a long time, if not forever, such as information that one posts online that does not go away because it is passed on and spread.
  14. Having an unknown identity
  15. Symbols you can type that show how you feel
  16. Being aware of, sensitive to, and understanding what someone else is feeling or experiencing.
  17. To change the way something looks.
  18. Someone who acts in an aggressive, hostile, or hurtful manner toward others.

32 Clues: Less seriousMore seriousHaving an unknown identityTo change the way something looks.An extra (a second)layer of securitySymbols you can type that show how you feelTo change something that is written to make it better.The way something sounds and the feelings it expresses.Someone who accesses computer information without permission....

Password 2022-05-27

Password crossword puzzle
Across
  1. i
  2. d
  3. l
  4. m
  5. n
  6. h
  7. a
  8. f
  9. k
  10. t
  11. v
Down
  1. s
  2. c
  3. j
  4. e
  5. p
  6. o
  7. b
  8. y
  9. w
  10. z
  11. g
  12. q

23 Clues: scijepdlmonhbyafwzkgtqv

Password 2022-05-27

Password crossword puzzle
Across
  1. s
  2. n
  3. m
  4. p
  5. a
  6. k
  7. q
  8. h
  9. j
  10. c
  11. v
  12. b
Down
  1. f
  2. y
  3. t
  4. e
  5. z
  6. o
  7. g
  8. w
  9. i
  10. d
  11. l

23 Clues: fsyteznmpoakgwqhidjclvb

It's a crazy world out there! 2016-08-12

It's a crazy world out there! crossword puzzle
Across
  1. palvelu
  2. epäsuosittu
  3. sivistys
  4. vieraanvarainen
  5. yllättävä
  6. piirre
  7. totuus
Down
  1. onneksi
  2. muovi
  3. turvallisuus
  4. roskat
  5. maali
  6. viranomaiset
  7. päättää
  8. vanki
  9. paeta

16 Clues: muovimaalivankipaetaroskatpiirretotuusonneksipalvelupäättääsivistysyllättäväepäsuosittuturvallisuusviranomaisetvieraanvarainen

1234 2023-10-13

1234 crossword puzzle
Across
  1. prom
  2. odloty
  3. przepłynąć
  4. bramka
  5. przepłynąć
  6. dogodny
  7. podróż
  8. bagaż
Down
  1. pasażer
  2. ciężarówka
  3. motocykl
  4. port
  5. mikrobus
  6. ocjrona
  7. tunel
  8. bagażnik
  9. dostrzeć

17 Clues: promporttunelbagażodlotybramkapodróżpasażerocjronadogodnymotocyklmikrobusbagażnikdostrzećciężarówkaprzepłynąćprzepłynąć

Networking Concepts , Cyber Ethics 2025-06-15

Networking Concepts , Cyber Ethics crossword puzzle
Across
  1. Wide
  2. Privacy
  3. Access
  4. Manners
  5. Rules
  6. Connect
  7. Copying
Down
  1. Virus
  2. Internet
  3. Service
  4. Security
  5. Adress
  6. Device
  7. Stealing
  8. Harassment
  9. Local

16 Clues: WideVirusRulesLocalAccessAdressDevicePrivacyServiceMannersConnectCopyingInternetSecurityStealingHarassment

bullying 2023-11-28

bullying crossword puzzle
Across
  1. bullying An when you bully someone on ticktock,you tube
  2. bullying An hurting someones feelings
  3. games
  4. An when you hurt someone.
Down
  1. An you listen to people with ______.
  2. An saying rude things
  3. An talking when someone else is talking.
  4. An hurting with your feet.

8 Clues: gamesAn saying rude thingsAn when you hurt someone.An hurting with your feet.An you listen to people with ______.bullying An hurting someones feelingsAn talking when someone else is talking.bullying An when you bully someone on ticktock,you tube

GLOBAL POLITICS U4 AOS2 2022-09-12

GLOBAL POLITICS U4 AOS2 crossword puzzle
Across
  1. rights afforded to all human beings
  2. move across borders searching protection
  3. peaceful means to enforce int'l laws
  4. defined territory occupied by an entity
  5. state of panic due to a dispute
  6. Power concentrated to a singular leader
  7. approved by the head of state of a state
  8. involving in affairs of other actors
  9. use of violence to achieve an agenda
  10. System where actors control wealth
Down
  1. amount of money necessary to survive
  2. provide security and political stability
  3. use of armed force between parties
  4. global interaction among states
  5. popular uprising
  6. internal conflict in a state
  7. questions of morality
  8. to be safe from harm
  9. exercise legitimate political authority
  10. violations of the laws of war
  11. states conduct their foreign relations.

21 Clues: popular uprisingto be safe from harmquestions of moralityinternal conflict in a stateviolations of the laws of warglobal interaction among statesstate of panic due to a disputeuse of armed force between partiesSystem where actors control wealthrights afforded to all human beingsamount of money necessary to survive...

travel vocab 2020-04-08

travel vocab crossword puzzle
Across
  1. security agent
  2. to board
  3. car wagon
  4. to check luggage
  5. bunk
  6. to miss
  7. seat
  8. visa
  9. international airport
  10. ticket
  11. to land
  12. to see
  13. carry on luggage
  14. waiting room
  15. baggage claim
  16. platform
  17. departure
  18. counter
  19. first class
  20. safety belt
  21. flight attendant
  22. suitcase
  23. stop
  24. window
Down
  1. ticket
  2. to take off
  3. layover
  4. to get/obtain
  5. luggage screening
  6. boarding pass
  7. second class
  8. delayed
  9. passport
  10. to turn
  11. on time
  12. to hope
  13. aisle
  14. to go straight
  15. coach
  16. connection
  17. customs
  18. trip travel
  19. arrival
  20. passenger
  21. gate
  22. controller
  23. to go through security
  24. sleeping car
  25. ticket window
  26. event ticket

50 Clues: bunkseatvisagatestopaislecoachticketticketto seewindowlayoverdelayedto turnon timeto hopeto missto landcustomsarrivalcounterto boardpassportplatformsuitcasecar wagonpassengerdepartureconnectioncontrollerto take offtrip travelfirst classsafety beltsecond classwaiting roomsleeping carevent ticketto get/obtainboarding passbaggage claimticket window...

Cyberbullying 2022-05-09

Cyberbullying crossword puzzle
Across
  1. If you are being cyberbullied, you should keep _____ of their messages
  2. A type of worry that can be caused by cyberbullying
  3. Online harassment
  4. Extreme sadness
Down
  1. Sometimes a cyber bully may create a fake ___
  2. Online information: social
  3. Messaging between phones
  4. A popular video-viewing app
  5. If you are being cyberbullied, you should tell a _____ adult
  6. Not risky
  7. One way to defend against a cyberbully
  8. A messaging app whose icon is a little ghost

12 Clues: Not riskyExtreme sadnessOnline harassmentMessaging between phonesOnline information: socialA popular video-viewing appOne way to defend against a cyberbullyA messaging app whose icon is a little ghostSometimes a cyber bully may create a fake ___A type of worry that can be caused by cyberbullying...

HIPAA 2024-07-12

HIPAA crossword puzzle
Across
  1. The type of safeguard that lays out the policies and procedures that a covered entity must implement.
  2. The I in HIPAA stands for __________.
  3. The type of safeguard that protects ePHI and who has access to it.
  4. The two main HIPAA rules are the _______ Rule and Security Rule.
  5. The P in HIPAA stands for __________.
  6. The security rule ensures _________, integrity, and security of PHI.
  7. Healthcare providers, health plans, and healthcare clearinghouses are covered _________.
  8. 58% of people have lied to their physican due to fear of _________ or embarrassment.
Down
  1. The type of safeguard that protects the physical environment that the PHI is stored and accessed in.
  2. A _________ action plan may be required to return to HIPAA standards after a violation.
  3. The first A in HIPAA stands for ________.
  4. The maximum number of years you can serve in jail for a HIPAA violation.
  5. The e in ePHI stands for _________.
  6. The penalties of a HIPAA violation are jail time or a substantial _______.
  7. The P in PHI stands for _________.
  8. HIPAA protects the ________.

16 Clues: HIPAA protects the ________.The P in PHI stands for _________.The e in ePHI stands for _________.The I in HIPAA stands for __________.The P in HIPAA stands for __________.The first A in HIPAA stands for ________.The two main HIPAA rules are the _______ Rule and Security Rule.The type of safeguard that protects ePHI and who has access to it....

social media 2016-09-09

social media crossword puzzle
Across
  1. strange people
  2. keep safe from harm
  3. everybody has rights
  4. having an obligation to do something
  5. bullying the use of electronic communication to bully a person
  6. being free from being observed or disturbed by other people
  7. footprint a trail of data you create while using the Internet
  8. a group
Down
  1. a thing made to be similar or identical to another
  2. outline of something, especially a person's face
  3. putting a status on social media
  4. a bad group of people
  5. someone you don't know
  6. to be very involved in the internet
  7. ok at and comprehend the meaning

15 Clues: a groupstrange peoplekeep safe from harmeverybody has rightsa bad group of peoplesomeone you don't knowputting a status on social mediaok at and comprehend the meaningto be very involved in the internethaving an obligation to do somethingoutline of something, especially a person's facea thing made to be similar or identical to another...

Bullying 2012-10-30

Bullying crossword puzzle
Across
  1. deliberately harassing someone is b_______
  2. When you force someone to do something
  3. Bully someone without words, non-______
  4. You can bully someone ph______y
  5. When you bully someone with hand/body language
  6. You leave someone out of an activity or group
  7. th_____n (8 letters
  8. bullying someone online
Down
  1. you can bully someone m_____y
  2. You do it on purpose
  3. bullying can upset you and make you e________ (9 letters)
  4. 10 letter word h________t
  5. ______ 0 is the number you call for the fire/ambulance/police
  6. When you bully someone by calling someone names
  7. when you get mad feeling

15 Clues: You do it on purposeth_____n (8 lettersbullying someone onlinewhen you get mad feeling10 letter word h________tyou can bully someone m_____yYou can bully someone ph______yWhen you force someone to do somethingBully someone without words, non-______deliberately harassing someone is b_______You leave someone out of an activity or group...

iBoy by Samuel Opferman 2015-03-24

iBoy by Samuel Opferman crossword puzzle
Across
  1. Having an unknown name
  2. influence neural activity
  3. lack of strength
  4. a Greek philosopher and scientist born in Stagirus, northern Greece, in 384 BCE. His father, Nicomachus
  5. a combination of ingredients used in cooking or baking.
  6. computer network
Down
  1. Causing great astonishment, amazement, or dismay
  2. The supervising And continuing of an action to completion
  3. a lizard that chargés color
  4. Of or proceeding from the basic structure or nature of a person or thing;
  5. Having no limits
  6. In fact or to all purposes; practically
  7. to hold back
  8. Refusing to give up or let go; persevering obstinately.
  9. a power source

15 Clues: to hold backa power sourceHaving no limitslack of strengthcomputer networkHaving an unknown nameinfluence neural activitya lizard that chargés colorIn fact or to all purposes; practicallyCausing great astonishment, amazement, or dismayRefusing to give up or let go; persevering obstinately.a combination of ingredients used in cooking or baking....

ASEAN 2023-09-13

ASEAN crossword puzzle
Across
  1. Negara ASEAN dengan jumlah penduduk paling sedikit
  2. Kejahatan cyber crime merupakan dampak dari kemajuan
  3. Negara ASEAN dengan gunungapi terbanyak selain Indonesia
  4. Sungai Irawadi terletak di negara
  5. Keputusan tertinggi rapat ASEAN
  6. Masalah sosial negara berkembang
Down
  1. Sungai yang mengaliri pertanian di negara China, Myanmar, Laos
  2. Salah satu Sekjen ASEAN berada di negara
  3. Merk mobil yang berasal dari negara Malaysia
  4. Perjanjian AFTA di tanda tangani di negara
  5. Pertemuan Defence Minister Meeting (ADMM)membahas tentang
  6. Sungai Chao Praya mengalir di negara
  7. Kenampakan alam di Kampuchea yaitu dataran lacustrine, terjadi karena
  8. Pakaian tradisional Vietnam
  9. Organisasi negara-negara kawasan Asia Tenggara

15 Clues: Pakaian tradisional VietnamKeputusan tertinggi rapat ASEANMasalah sosial negara berkembangSungai Irawadi terletak di negaraSungai Chao Praya mengalir di negaraSalah satu Sekjen ASEAN berada di negaraPerjanjian AFTA di tanda tangani di negaraMerk mobil yang berasal dari negara MalaysiaOrganisasi negara-negara kawasan Asia Tenggara...

twitter 2013-11-21

twitter crossword puzzle
Across
  1. and app for evry on
  2. it is the oppisite of being nice
  3. bullying bulliying on line
  4. a socal media website where you tweet
Down
  1. it is the oppisite of good
  2. where ypu text online
  3. online chat room
  4. online chat for blackbery
  5. you know is where someone thinks they know best on the internet

9 Clues: online chat roomand app for evry onwhere ypu text onlineonline chat for blackberyit is the oppisite of goodbullying bulliying on lineit is the oppisite of being nicea socal media website where you tweetyou know is where someone thinks they know best on the internet

business/UAE/school 2021-02-04

business/UAE/school crossword puzzle
Across
  1. cities
  2. supplies
  3. gathering
  4. children
  5. retail
  6. bill
  7. guidance
  8. management
Down
  1. food
  2. playtime
  3. aid
  4. money
  5. consumer
  6. development
  7. security
  8. learning

16 Clues: aidfoodbillmoneycitiesretailplaytimesuppliesconsumerchildrensecuritylearningguidancegatheringmanagementdevelopment

Sustainability 2019-05-02

Sustainability crossword puzzle
Across
  1. beings
  2. Science
  3. Made
  4. test
  5. protection
  6. Goal
  7. World
  8. Agreement
  9. Security
Down
  1. Distructure
  2. environmental
  3. Chranabled
  4. Change
  5. Seeds
  6. Mammal
  7. Write

16 Clues: MadetestGoalSeedsWriteWorldbeingsChangeMammalScienceSecurityAgreementChranabledprotectionDistructureenvironmental

Viajes 2014-11-13

Viajes crossword puzzle
Across
  1. clothes
  2. station
  3. bathingsuit
  4. vacation
  5. line
  6. passport
  7. ticket
Down
  1. departure
  2. security
  3. suitcase
  4. trip
  5. totravel
  6. airport
  7. luggage
  8. flight
  9. gate

16 Clues: triplinegateflightticketclothesstationairportluggagesecuritysuitcasetotravelvacationpassportdeparturebathingsuit