cyber security Crossword Puzzles
Viajar 2023-03-10
19 Clues: seat • exit • plane • pilot • aisle • window • flight • ticket • to land • airline • counter • luggage • arrival • customs • security • to board • suitcase • passenger • to take off
Refugee 2022-12-06
23 Clues: RCHNU • redrob • sserts • sisirc • enimaf • epacse • sudoxe • retlehs • yrtnuoc • eegufer • eeucave • ytiruces • yrautcnas • noitargim • ytilitsoh • decalpsid • seitlausac • enitnarauq • noitucesrep • noitatroped • noitargimmi • ssensselemoh • noitairtaper
vamos a viaje 2023-02-02
20 Clues: gate • ticket • flight • luggage • airport • arrival • to land • suitcase • to board • security • vacation • passport • itinerary • departure • passenger • to travel • to takeoff • call somebody • identification • monitor or screen
E 2024-05-17
22 Clues: - been • - afstand • - genezen • - beschouw • - benodige • - aanwezig • - Algemeen • - bevestigd • - beheerder • - geschikte • - Bediening • - eschikbare • - aanzienlijk • - uitgevoerde • - afhankelijk • - beveiliging • - aankondiging • - behendigheid • - bereidtzichop • - flierefluiten • - flexibiliteit • ogni parola inglese
Buffet de vocabulaire: Bon voyage page 8 2025-10-26
20 Clues: seat • plane • track • flight • airport • luggage • counter • customs • to land • platform • security • terminal • newsstand • snack bar • restrooms • to declare • to take off • compartment • information • luggage check
Whatsapp in the news bbc 2025-06-17
Across
- The right to keep personal information secure and confidential.
- The process of converting data into a coded format to protect privacy.
- The parent company of WhatsApp, involved in the legal fight over encryption.
Down
- A popular messaging app known for its end-to-end encryption.
- The entity seeking access to encrypted user data in this legal case.
- Measures taken to protect information from unauthorized access.
- Short for "Technical Capability Notice," a secret government request for data access.
- The tech giant currently battling the UK Home Office over data security.
- End-to-end encryption, a security method preventing third-party access to messages.
- Apple’s cloud storage service that uses encryption for data security.
10 Clues: A popular messaging app known for its end-to-end encryption. • Measures taken to protect information from unauthorized access. • The right to keep personal information secure and confidential. • The entity seeking access to encrypted user data in this legal case. • Apple’s cloud storage service that uses encryption for data security. • ...
Privacy and security 2018-11-14
Across
- This is when someone is calling or emailed you and tries to get you to sign up for something to get your personal info.
- when the sims 4 game is ______ it becomes all pixelated.
- This is when someone has you identity.
- Usually ______ are hacked because they have the most personal info
- Students learn strategys on how to protect there online ______________ for something.
- if you have a strong ______ you will most likely not be hacked
- How many people where effected when Facebook was hacked.
Down
- how many adults have been hacked in 2018
- Who need to learn about this so there future isn't affected?
- When repetitive emails are sent telling you that you won something and want you to do something.
- This is a statement or legal document explaining how the party/company is using your information.
- when people are hacked because of weak passwords their_________.
- if there where _______ to teach people how to stay safe; more people would not be hacked
- So many people are hacked because they are _______.
- What was the year that the most people where hacked
15 Clues: This is when someone has you identity. • how many adults have been hacked in 2018 • So many people are hacked because they are _______. • What was the year that the most people where hacked • when the sims 4 game is ______ it becomes all pixelated. • How many people where effected when Facebook was hacked. • ...
Ukraine Food Security 2022-10-26
Across
- Goods sent out of a country
- Relating to the government or affairs of a country
- Conflict between different countries
- Being provided with the necessary food for growth
- Resources given to aid others
- How much something costs
- Not enough of something (food)
- Current leader of Russia
- The country currently in need of help
Down
- Not having enough of/the right food
- The state of being stable, regarding to food
- Hostile actions to another
- Someone/a family being forced to leave their home
- When you help someone, you provide them with your ...
- Something of a high cost
15 Clues: How much something costs • Something of a high cost • Current leader of Russia • Hostile actions to another • Goods sent out of a country • Resources given to aid others • Not enough of something (food) • Not having enough of/the right food • Conflict between different countries • The country currently in need of help • The state of being stable, regarding to food • ...
Ukraine Food Security 2022-11-01
Across
- Relating to the government or affairs of a country
- Not enough of something (food)
- Goods sent out of a country
- Someone/a family being forced to leave their home
- Current leader of Russia
- Conflict between different countries
- Something of a high cost
- Being provided with the necessary food for growth
Down
- Resources given to aid others
- Not having enough of/the right food
- The country currently in need of help
- Hostile actions to another
- When you help someone, you provide them with your ...
- How much something costs
- The state of being stable, regarding to food
15 Clues: How much something costs • Current leader of Russia • Something of a high cost • Hostile actions to another • Goods sent out of a country • Resources given to aid others • Not enough of something (food) • Not having enough of/the right food • Conflict between different countries • The country currently in need of help • The state of being stable, regarding to food • ...
Ukraine Food Security 2022-11-01
Across
- Relating to the government or affairs of a country
- Not enough of something (food)
- Goods sent out of a country
- Someone/a family being forced to leave their home
- Current leader of Russia
- Conflict between different countries
- Something of a high cost
- Being provided with the necessary food for growth
Down
- Resources given to aid others
- Not having enough of/the right food
- The country currently in need of help
- Hostile actions to another
- When you help someone, you provide them with your ...
- How much something costs
- The state of being stable, regarding to food
15 Clues: How much something costs • Current leader of Russia • Something of a high cost • Hostile actions to another • Goods sent out of a country • Resources given to aid others • Not enough of something (food) • Not having enough of/the right food • Conflict between different countries • The country currently in need of help • The state of being stable, regarding to food • ...
Information Security Crossword 2025-09-03
Across
- principle of keeping data accurate and unchanged. (9 letters)
- program that spreads by attaching to files. (5 letters)
- secret used to access systems. (8 letters)
- security item to secure doors. (5 letters)
- designed to damage or disrupt. (7 letters)
- accounts with two or more verification steps. (3 letters)
- document defining how data is handled. (6 letters)
Down
- who gains unauthorized access. (6 letters)
- review of systems for compliance and risks. (5 letters)
- information unreadable without a key. (11 letters)
- control that limits who can see or use data. (9 letters)
- messages used to trick people into giving data. (8 letters)
- hidden malicious program disguised as useful. (6 letters)
- where someone pretends to be another user. (11 letters)
- systems and networks from attacks. (10 letters)
15 Clues: who gains unauthorized access. (6 letters) • secret used to access systems. (8 letters) • security item to secure doors. (5 letters) • designed to damage or disrupt. (7 letters) • systems and networks from attacks. (10 letters) • information unreadable without a key. (11 letters) • document defining how data is handled. (6 letters) • ...
The Final 2025-08-20
Across
- ein áleypari (bæði á vøllinum og uttanfyri)
- The Final. Attack on Wembley is a ?
- The safest _____ was England losing
- málscorari
- verjuleikari
- Player focused on free school meals Marcus ?
- The England team missed three ?
- ____ guard
- the sport
- what the stadium went into when the pressure from fans was at its highest
- a plan
- number of years between each of the England finals
Down
- the players came from different ?
- It´s _____ home
- Feeling it gives fans when their team wins
- Feeling fans get when they cannot enter the stadium
- Feel an _____ rush
- Wembley is the ____ stadium of England
- word used when security cannot control an entrance
19 Clues: a plan • the sport • málscorari • ____ guard • verjuleikari • It´s _____ home • Feel an _____ rush • The England team missed three ? • the players came from different ? • The Final. Attack on Wembley is a ? • The safest _____ was England losing • Wembley is the ____ stadium of England • Feeling it gives fans when their team wins • ein áleypari (bæði á vøllinum og uttanfyri) • ...
Delirium section 2 2015-05-04
Across
- A solution to a sickness.
- A building on a farmstead.
- A live music show.
- A Word for security watching people.
- Library of approved books.
- The name for the disease of love.
- Library of authorized music.
- People who live in the wilds.
- The main characters best friend.
- University of ______
- The color of a storm cloud.
- Main character.
Down
- A time set for someone to be home.
- Group of people who patrol the streets after curfew.
- Separation of people based on prejudice.
- Alex has a 3 pronged ____ on the side of his head.
- A place where science experiments are conducted.
- Lena's aunts name.
- A vision you have while sleeping.
- Security guard who catches Lena and Hana.
20 Clues: Main character. • A live music show. • Lena's aunts name. • University of ______ • A solution to a sickness. • A building on a farmstead. • Library of approved books. • The color of a storm cloud. • Library of authorized music. • People who live in the wilds. • The main characters best friend. • The name for the disease of love. • A vision you have while sleeping. • ...
MLK Community Trivia 2023-11-11
Across
- main street nearest this location
- feeder Middle School to East High
- thriving neighborhood fitness center
- friendly Youth Services Manager
- resource center filled with literature
- Community nickname
- Harley Field is located here
- assist students w/ schoolwork and STEM activities
- education center for 9th - 12th grade
Down
- Dr. King's name
- referred to as "Unk" or "Uncle" at the branch
- largest park near MLK Library
- our comedic male security officer
- can be found engaging with teens
- the MLK "TikTok" Queen
- MLK Branch manager
- the next educational level after high school
- motherly, nurturing security officer
- works mostly with children at MLK
- local rec & community center
- person most likely in School Help Center
- GO BUCKS!
22 Clues: GO BUCKS! • Dr. King's name • MLK Branch manager • Community nickname • the MLK "TikTok" Queen • local rec & community center • Harley Field is located here • largest park near MLK Library • friendly Youth Services Manager • can be found engaging with teens • main street nearest this location • our comedic male security officer • feeder Middle School to East High • ...
Financial Fundamentals 2023-05-24
Across
- Rate of ________ is the relationship between the amount received and cost of investment
- Regulates bank deposits
- _________ tax is based on land and buildings
- _______ system shows the relationships between individuals, businesses, and governments
- Trade _______ is bad for the economy; buying things outside of the country
- A short-term debt security (abbr)
- A rise in the general level of prices
- ______ price index is an index of the variation in prices paid by typical consumers for retail goods and other items.
- _______ Supply is the amount of money in circulation in an economy
- _______ Cash Flow is money expected to receive in the future
Down
- A security representing ownership in a corporation
- ________ Exchange Rate is the value of a country’s currency in relation to the value of the money in another country
- Regulates stock markets
- A security representing a loan issued by a business or government
- _______ rates are the cost of borrowing money
- Any item that serves as a method of payment
- _____ Insurance insures an individual against the risk of financial loss in case of death
- _______ markets are securities with maturities of greater than one year
- Trade _______ is good for the economy; trading out/paying for goods in country
- Regulates banks
20 Clues: Regulates banks • Regulates bank deposits • Regulates stock markets • A short-term debt security (abbr) • A rise in the general level of prices • Any item that serves as a method of payment • _________ tax is based on land and buildings • _______ rates are the cost of borrowing money • A security representing ownership in a corporation • ...
Terminology 2025-12-12
Across
- Internal resource for learning and development.
- Facility space containing equipment for cooling air/water using refrigerant.
- Personnel who accompany visitors or assets within a facility.
- We provide security and safety services
- System used for incident reporting and management.
- Safeguard people and locations to deliver on Meta's priorities, principles, and mission.
- The enclosure on the roof of a building that houses mechanical equipment.
- A silent alert signaling that a person is under threat.
- Microsoft's email and personal information manager application.
Down
- A sudden illness or injury requiring immediate attention.
- A highly secure, restricted area within Meta data centers where the destruction and sanitation of storage media devices take place.
- The internal knowledge base for Global Security Operations.
- Learning and development platform used for training courses.
- Main entry control point, often where visitors check in.
- Room where external network circuits enter the building (acronym).
- The main area in a facility where servers and network gear are housed.
- Consistent, regular routes and patterns followed by security personnel.
- Physical access control system software used to manage badge access.
- A room containing heat exchanger elements, often for HVAC.
19 Clues: We provide security and safety services • Internal resource for learning and development. • System used for incident reporting and management. • A silent alert signaling that a person is under threat. • Main entry control point, often where visitors check in. • A sudden illness or injury requiring immediate attention. • ...
40 Limited Edition 3IT 2014-09-30
Across
- food
- self-centered&egoistic
- orange bag
- batman
- never iron shirt
- socks on the floor
- upsized Lee
- last girl before boys
- bird nest
- rolling in the deep
- tallest girl
- the queen
- TicTac Santa
- 18/17
- Mr Tay's darling
- 154cm
- Keep calm and study
- opp. of white
- broken finger
Down
- wood
- bimbo
- bad hair day
- Ritchie
- keep calm and take MC
- sleeping beast
- 우빈
- 10+9 on the list
- downsized Han
- football team
- The devil
- Ting Xie artist
- name list
- Loudest girl
- hair very nice boy
- tallest boy
- his girlfriend
- cyber rapist
- wushu
- chatterbox
- ( x,y )
40 Clues: 우빈 • wood • food • bimbo • 18/17 • 154cm • wushu • batman • Ritchie • ( x,y ) • The devil • name list • bird nest • the queen • orange bag • chatterbox • upsized Lee • tallest boy • bad hair day • Loudest girl • tallest girl • TicTac Santa • cyber rapist • downsized Han • football team • opp. of white • broken finger • sleeping beast • his girlfriend • Ting Xie artist • never iron shirt • 10+9 on the list • Mr Tay's darling • socks on the floor • ...
5 2024-07-06
Across
- Warrior Princess TV show.
- Classic arcade game.
- Pop princess Spears.
- Alternative rock band Pumpkins.
- Cult classic superhero movie.
- Cult classic cyber thriller.
- Popular khaki pants brand.
- James Cameron's epic romance.
- Virtual pet keychains.
- Early wireless handheld computer.
- Boy band New Kids on the Block.
- Scifi film with Keanu Reeves.
Down
- Pop icon with many hits.
- 3D optical illusion books.
- Early pagers for communication.
- Collectible milk caps game.
- Dark comedy crime film.
- Paranormal investigation TV show.
- Rapper known for "Gangsta's Paradise".
- Band fronted by Gwen Stefani.
- Collectible toy cars.
- TV show about a working-class family.
- Mitsubishi sports car model.
- Purple dinosaur children's show.
- Pop-punk band.
25 Clues: Pop-punk band. • Classic arcade game. • Pop princess Spears. • Collectible toy cars. • Virtual pet keychains. • Dark comedy crime film. • Pop icon with many hits. • Warrior Princess TV show. • 3D optical illusion books. • Popular khaki pants brand. • Collectible milk caps game. • Cult classic cyber thriller. • Mitsubishi sports car model. • Cult classic superhero movie. • ...
Teka-Teki Silang kata serapan dan konjungsi 2025-09-15
Across
- salah satu di dari klausa itu adalah anak
- kata"sebelumnya"merupakan konjungsi
- memperkaya kosakata merupakan fungsi dari
- bisnis berasal dari bahasa
- peramban merupakan serapan dari kata
- kata"tetapi, melainkan"merupakan kata hubung
- kata"atau" merupakan konjungsi
- konjungsi merupakan kata...dalam suatu kalimat
- kata"terakhir" merupakan konjungsi
Down
- kata angka diserap dari bahasa
- adaptasi merupakan unsur serapan yang disesuaikan pada ejaan dan lafal
- kata siber diserap dari kata
- biarpun San meskipun termasuk subordinatif
- rekening adalah contoh kata serapan
- kata yang digunakan untuk menghubungkan frasa/klausa disebut konjungsi
- adi suka baca buku. Baca merupakan jenis kata serapan
- seperti dan seolah-olah termasuk subordinatif
- kata"guna"merupakan konjungsi
- dosen berasal dari bahasa Belanda yaitu
- bola berasal dari bahasa
20 Clues: bola berasal dari bahasa • bisnis berasal dari bahasa • kata siber diserap dari kata • kata"guna"merupakan konjungsi • kata angka diserap dari bahasa • kata"atau" merupakan konjungsi • kata"terakhir" merupakan konjungsi • rekening adalah contoh kata serapan • kata"sebelumnya"merupakan konjungsi • peramban merupakan serapan dari kata • dosen berasal dari bahasa Belanda yaitu • ...
Cyber Threat Landscape 2024-04-04
Across
- Pretending to be an employee that forgot their password
- Type of phishing scam that involves an email with phone number to call
- Using digital ads to deliver malware
- Cybercriminals send emails claiming to be from a reputable source
- Sending text messages containing malicious link
- Type of phishing attack that targets specific people or organizations through malicious emails
- Software designed to disrupt a device's normal operations without the user's knowledge
Down
- Type of authentication that uses multi-step account log in process that requires more than just a password
- Type of malware that prevents users from accessing their device and data
- Defrauding people over the phone
- Cybersecurity thret using QR codes to trick users
- Manipulated video, photo or audio recording that used AI to make it appear real
- Type of scam that an email appears to be sent for legitimate request
13 Clues: Defrauding people over the phone • Using digital ads to deliver malware • Sending text messages containing malicious link • Cybersecurity thret using QR codes to trick users • Pretending to be an employee that forgot their password • Cybercriminals send emails claiming to be from a reputable source • ...
Vocabulary 11A/ 11B 2014-11-30
20 Clues: meklēt • vīruss • nozagt • drošība • izdzēst • aplaupīt • atzīties • pielikums • noziegums • slepkavība • lejuplādēt • tiešsaiste • pieslēgties • kabatzaglis • noķert zagli • veikalu zaglis • izdarīt noziegumu • izdemolēt īpašumu • portatīvais dators • platjoslas internets
Unit 16 2020-04-16
21 Clues: padi • rabav • loeng • sadam • pagas • trahv • kirurg • kohane • kandik • ilmnema • mehaanik • vahekäik • karistus • aksessuaar • turvalisus • ürgne loodus • võõrastemaja • reisiterminal • meditsiiniline • reisi sihtkoht • kellekski saada tahtja
Лудкечпи 2020-03-10
20 Clues: цель • опора • лэптоп • быстрый • код,шифр • страшный • масса,куча • добиваться • запутанный • надёжность • доступность • последствие • безопасность • осведомленность • злоупотребление • нарушитель защиты • целостность данных • результат, проблема • финансовые средства • средства, имущество
SS2 p.50 2020-11-02
22 Clues: arm • rijk • meer • vele • gebied • kennis • luxueus • helling • smoking • houding • opereren • bevroren • vijandig • medaille • crimineel • mysterieus • veiligheid • vrouwelijk • gelegenheid • eerste hulp • lenig, soepel • persoonlijkheid
1 2024-05-17
23 Clues: way • leg • wall • cured • flies • General • Control • present • agility • security • prepared • suitable • distance • consider • required • Available • confirmed • conducted • dependent • substantial • flexibility • announcement • administrator
Hispanic Heritage Month (airport edition) 2024-09-07
23 Clues: Hat • Food • Gate • Belt • Drink • Shoes • Sharp • Hello • Please • Knives • Pockets • Welcome • Airport • Needles • Baggage • Aviation • Airplane • Passport • Thankyou • Bathroom • Computer • Security • Goodmorning
Crucigrama del vocabulario de avión 2025-03-13
23 Clues: país • avión • vuelo • Salir • aduana • maleta • demora • boleto • luggage • destino • pasajera • reclamar • despegar • maletero • pasaporte • Aterrizar • seguridad • mostrador • extranjero • aéreolinea • tripulación • desembarcar • inspeccionar
Incarceron 2022-03-15
20 Clues: zDw • dww • wqdd • dqdw • aszza • dwddw • wdwdq • wqddw • shake • asdad • szxZXx • dwdwqw • adwqdw • ddwwqd • wqdwdwq • wqddwqdwd • rub or push • unavoidable • az metal band • guards and security
Maslow's hierarchy of needs 2025-12-08
23 Clues: ценить • искать • внешний • отличие • выбирать • улучшать • присущий • ключевой • оценивать • способный • поведение • результат • директива • установить • цитировать • неспособный • безопасность • свойственный • использовать • осведомленный • гарантировать • иметь значение • трудоустройство
Sustainability 2019-05-02
Sustainability 2019-05-02
Networking Concepts , Cyber Ethics 2025-06-15
ord fra teksten 2025-08-25
Chapter 2 Vocabulary 2022-09-07
Across
- Security through domination
- ability to wield power independently
- The fundamental rules and norms of politics
- weak states that breaks down
- The ability of a state to carry out actions
- Political power concentrated to authority
- Ability to wield power to make people work
- States that have strong sovereignty
- tendency toward decentralisation
- Federalism that is not uniform
Down
- Combined political entities of state, regime, gov
- Power that is distributed to regional bodies
- Something recognised as right and proper
- States that have weak sovereignty
- Appeals on the laws they offer
- Using customs and age to justify
- Organisation that maintains a monopoly of violence
- Appeals by power or ideas
- Security through cooperation
- The leadership that runs the state
20 Clues: Appeals by power or ideas • Security through domination • weak states that breaks down • Security through cooperation • Appeals on the laws they offer • Federalism that is not uniform • Using customs and age to justify • tendency toward decentralisation • States that have weak sovereignty • The leadership that runs the state • States that have strong sovereignty • ...
Cybersecurity Awareness 2023 2023-10-06
Across
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
- Digital ______ is the ability to use digital technology and media effectively
- Illegal _____ of copyrighted material is often referred to as piracy
- Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- Cybersecurity awareness month
- Online commenter whose intent is to attack views expressed online; these attacks are often personal
- Many features in online _____ can expose players to predators
- A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
- A person who attempts to gain unauthorized access to computer systems
- _____ settings help control things like your profile, contact, and other information relating to your account
- Online harrassment
- A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
- ______ theft is a type of crime in which your private information is stolen and used for criminal activity
- Designed to detect and destroy computer viruses
15 Clues: Online harrassment • Cybersecurity awareness month • Designed to detect and destroy computer viruses • Many features in online _____ can expose players to predators • Illegal _____ of copyrighted material is often referred to as piracy • A person who attempts to gain unauthorized access to computer systems • ...
ICSS Unit 6 2024-08-16
Across
- Data cleansing will eliminate data that are ________.
- DNC Registry allows one to opt out of receiving __________ calls and messages
- Operational _______ refers to business disruption as a result of data breach.
- Operational security is also known as _______ security.
- A common form of MFA is two-factor __________.
- What type of system is required to keep customers' data secure?
- One way to ethically gain customer data is through a ________ survey.
- DTMF will mask the tones so that attacker will not be able to decipher the _______ frequency of the credit card details that was keyed in.
Down
- ______ loggers steal login credentials and sensitive enterprise data.
- Patch updates could be delayed due to undiscovered __________ before a major software update.
- One of the consequences of security breach is ______ damage.
- Trojans are malicious programs disguised as ________ ones.
- PDDA stands for Personal Data ________ Act
- Telephony ______ of services attack is an attempt to make telephone system unavailable to users.
- Too much data is also known as data ______.
- They key concepts of PDPA are consent, reasonableness and ________.
16 Clues: PDDA stands for Personal Data ________ Act • Too much data is also known as data ______. • A common form of MFA is two-factor __________. • Data cleansing will eliminate data that are ________. • Operational security is also known as _______ security. • Trojans are malicious programs disguised as ________ ones. • ...
Transhumanizam - ponavljanje 2024-04-10
Across
- Postupak zamrzavanja sa svrhom očuvanja tkiva
- Kiborg, Cyber
- Pokret koji nastoji pomoću tehnologije iskorijeniti patnju živih bića
- Filozofski i znanstveni pokret koji zagovara korištenje trenutnih i novih tehnologija
Down
- Musk Osnivač SpaceX-a
- ... Života
- Moždani čip Elona Muska
- Popularizirao pojam transhumanizma u svom eseju
8 Clues: ... Života • Kiborg, Cyber • Musk Osnivač SpaceX-a • Moždani čip Elona Muska • Postupak zamrzavanja sa svrhom očuvanja tkiva • Popularizirao pojam transhumanizma u svom eseju • Pokret koji nastoji pomoću tehnologije iskorijeniti patnju živih bića • Filozofski i znanstveni pokret koji zagovara korištenje trenutnih i novih tehnologija
Digital Privacy Crossword 2024-10-16
Across
- A document that explains how websites use your data
- Extra layer of security that requires a code
- Data scrambled for security
- Using fake accounts to access restricted content
Down
- Checking identity before giving access
- Hidden malware disguised as legitimate software
- Small text files that track your online activity
- Security software that scans for threats
- Technology that verifies you are human (used on websites)
- A service that masks your IP address
10 Clues: Data scrambled for security • A service that masks your IP address • Checking identity before giving access • Security software that scans for threats • Extra layer of security that requires a code • Hidden malware disguised as legitimate software • Small text files that track your online activity • Using fake accounts to access restricted content • ...
nvs 2013-09-12
FLM NOVEMBER Crossword 2025-11-05
Across
- color for many discounts on this Friday
- tree associated with Canada
- bird with red chin
- "glad I get to enjoy this" *feeling*
- to trip & ____
- holiday on the fourth Thursday in November
- "rhymes with door hinge"
- accumulation of rain
Down
- online sale name for this Monday
- protects from sky's showers
- sport played on ice with brooms
- what Mariah Carey is frozen in until November 1st
- boil them, mash them, put them in a stew
- the color a popular song about demon hunting
- who you feel at home with
- what you go to Devil's lake to do in the fall
- changing colors seasonally
- popular fall gourd
18 Clues: to trip & ____ • bird with red chin • popular fall gourd • accumulation of rain • "rhymes with door hinge" • who you feel at home with • changing colors seasonally • protects from sky's showers • tree associated with Canada • sport played on ice with brooms • online sale name for this Monday • "glad I get to enjoy this" *feeling* • color for many discounts on this Friday • ...
Black Friday 2025-11-19
Across
- ; A good offer or a good price.
- ; Full of people.
- ; A time when things are cheaper.
- ; A person who buys something.
- ; Something that does not cost a lot of money.
- ; A group of people waiting.
Down
- Something that costs a lot of money.
- ; A price reduction.
- ; A place where you can buy things.
- Monday ; The online shopping day after Black Friday.
- mall ; A big building with many stores.
11 Clues: ; Full of people. • ; A price reduction. • ; A group of people waiting. • ; A person who buys something. • ; A good offer or a good price. • ; A time when things are cheaper. • ; A place where you can buy things. • Something that costs a lot of money. • mall ; A big building with many stores. • ; Something that does not cost a lot of money. • ...
Black Friday 2025-11-19
Across
- ; A good offer or a good price.
- ; Full of people.
- ; A time when things are cheaper.
- ; A person who buys something.
- ; Something that does not cost a lot of money.
- ; A group of people waiting.
Down
- Something that costs a lot of money.
- ; A price reduction.
- ; A place where you can buy things.
- Monday ; The online shopping day after Black Friday.
- mall ; A big building with many stores.
11 Clues: ; Full of people. • ; A price reduction. • ; A group of people waiting. • ; A person who buys something. • ; A good offer or a good price. • ; A time when things are cheaper. • ; A place where you can buy things. • Something that costs a lot of money. • mall ; A big building with many stores. • ; Something that does not cost a lot of money. • ...
ISMS Introduction Puzzle 2022-03-13
Across
- The organization shall evaluate the information security performance and the _______ of the ISMS
- Need to demonstrate leadership and commitment with respect to the ISMS
- In the risk treatment process, this document must be produced before formulating an information security treatment plan
- A potential cause of an unwanted incident, which may result in harm to a system or organization
- Combination of the probability of an event and its consequences
- The organization shall determine interested parties that are relevant to the ISMS and the requirements of these interested parties relevant to information security. the above statement is described under Clause x.x Understanding the needs and ______________of interested parties.
- The organization shall continually improve the __________________, adequacy and effectiveness of the ISMS.
Down
- Contains the control objectives and controls to help in the information security risk treatment process
- Ensuring that information is accessible only to those authorized to access
- Excluding any of the requirements specified in Clause 4 to 10 is not acceptable when an organization claims ______to this International Standard
- The organization shall ensure that the information security risk assessments produce consistent, valid and ________ results.
- Is conducted at planned intervals to ensure the suitability, adequacy and effectiveness of ISMS
- Shall be conducted by the organization at planned intervals to provide information on whether the ISMS conforms to the organization’s own requirements for its ISMS and the requirements of the ISO27001 standards.
- The organization shall determine the boundaries and applicability of the ISMS to establish its
- Documented information of external _______, determined by the organization to be necessary for the planning and operation of the ISMS, shall be identified as appropriate, and controlled
15 Clues: Combination of the probability of an event and its consequences • Need to demonstrate leadership and commitment with respect to the ISMS • Ensuring that information is accessible only to those authorized to access • The organization shall determine the boundaries and applicability of the ISMS to establish its • ...
global food security cross word puzzle 2024-04-19
Across
- An adequate supply doesn't guarantee household food security. Focus on incomes, expenditures, markets, and prices. Factors: Purchasing power, income, transportation, and market infrastructures.
- Crucial for agriculture, requires sustainable management
- Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets.
- Focuses on nutrient intake and utilization by individuals. Influenced by care and feeding practices, food preparation, diet diversity, and intra-household food distribution. Determines nutritional status.
- Addresses the "supply side" of food security. Determined by food production, stock levels, and net trade. Includes domestic production, import capacity, and food stocks.
- the food crisis created awareness for food security and led to a formal institutional response globally. However, food availability through buffer stocks was considered enough for ensuring food security.
Down
- The first basic human necessity and everyone's fundamental right.
- leading international efforts to address the need that people around the world have for reliable sources of quality food.
- Long-term or persistent. Results from poverty and lack of resources. Addressed by long-term development measures.
- Importance of consistent access to food. Factors affecting stability: Adverse weather, political instability, and economic factors. Periodic inadequate access can lead to nutritional deterioration.
- When all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life.
- Altered weather patterns and agricultural productivity
- Foster Strategic Coordination-regional and global level to improve governance and to promote better allocation of resources.
- Invest in country-owned plans, aimed at channeling resources to well- designed and results-based programs and partnerships.
- evidence of increasing malnutrition among the children/females led to inclusion of nutrition also as an essential element of food security.
15 Clues: Altered weather patterns and agricultural productivity • Crucial for agriculture, requires sustainable management • The first basic human necessity and everyone's fundamental right. • Short-term, sudden drop. Results from shocks and fluctuations. Requires early warning systems and safety nets. • ...
Cyber Security Crossword By Mora Marcuzzi 2020-08-20
Across
- diseñado para infiltrarse en su dispositivo sin su conocimiento.Son subrepticios y trabajan activamente en contra de los intereses de la persona atacada.
- correo electrónico no solicitado que recibe una persona.
- evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.
- infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador.
Down
- es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
- recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.
6 Clues: correo electrónico no solicitado que recibe una persona. • evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red. • infectan otros archivos del sistema con la intención de modificarlos para destruir de manera intencionada archivos o datos almacenados en tu computador. • ...
Chapter 5 - Everything Needs to Be Secured 2025-11-06
Across
- Data relating to an individual that can identify or locate them.
- Software designed to damage, disrupt, or steal data.
- HOMES Homes with sensors and connected devices, increasing security risks.
- DATA Corporate data that may contain secrets or patents.
- Ethical hacker who helps organizations strengthen their security.
Down
- Hacker who acts with malicious intent.
- OF UPGRADEABILITY IoT limitation where devices cannot be updated easily.
- SECURITY Fences, guards, CCTV, and gates used to protect corporate facilities.
- A network filtering system that blocks unauthorized access.
- HOTSPOT A risky Wi-Fi network where traffic is not encrypted.
- DEVICES Devices connected to the internet that collect and exchange data.
- A secure encrypted connection used when accessing insecure networks.
- Software that scans, detects, and removes malicious programs.
13 Clues: Hacker who acts with malicious intent. • Software designed to damage, disrupt, or steal data. • A network filtering system that blocks unauthorized access. • DATA Corporate data that may contain secrets or patents. • Software that scans, detects, and removes malicious programs. • Data relating to an individual that can identify or locate them. • ...
crossword puzzle 2021-05-20
Across
- cyber hub is located in
- tourism provides changes which causes
- teet ka achar is a pickle made from _ tree
- tourism may change _ effects
Down
- old custom of people which is still followed
- famous epic mahabharata was written in this state
- bird santuary is located in
- traditional headgear worn by men
- women cover their head by
9 Clues: cyber hub is located in • women cover their head by • bird santuary is located in • tourism may change _ effects • traditional headgear worn by men • tourism provides changes which causes • teet ka achar is a pickle made from _ tree • old custom of people which is still followed • famous epic mahabharata was written in this state
E-Safety 2013-12-09
Across
- Usually a scam but can be used to advertise.
- bully A person that uses the internet to bully someone.
- Staying safe on-line.
- A popular social networking website.
- A scam to steal your information.
Down
- A person that steals your information.
- Keeps your information safe.
- Allows you to video chat.
- Attacks your computer.
9 Clues: Staying safe on-line. • Attacks your computer. • Allows you to video chat. • Keeps your information safe. • A scam to steal your information. • A popular social networking website. • A person that steals your information. • Usually a scam but can be used to advertise. • bully A person that uses the internet to bully someone.
Kelas 7.5_Keisha Sunjaya 2023-05-10
Across
- memperoleh informasi yg tepat dan akurat merupakan damoak tik yg
- mendapatkan jaringan nama lainnya
- salah satu kartu untuk mengakses kesehatan
- privasi yg berhubungan dengan fisik seseorang
- proyek kolaborasi merupakan media sosial yg berbentuk
- contoh perdagangan e-commerce
Down
- keinginan untuk menyendiri
- semua kolaborasi yg di upayakan pasti di mediasi oleh
- salah satu pengaruh tik yaitu
- cyber bullying merupakan contoh dampak yg
10 Clues: keinginan untuk menyendiri • salah satu pengaruh tik yaitu • contoh perdagangan e-commerce • mendapatkan jaringan nama lainnya • cyber bullying merupakan contoh dampak yg • salah satu kartu untuk mengakses kesehatan • privasi yg berhubungan dengan fisik seseorang • semua kolaborasi yg di upayakan pasti di mediasi oleh • ...
Informatika 2024-08-10
Across
- Salah satu game online popular
- salah satu aplikasi media sosial
- Ilmu yang berkaitan dengan pemodelan matematika dan penggunaan komputer untuk menyelesaikan masalah-masalah sains
Down
- Salah satu karakter dalam profil pelajar pancasila
- Penghitungan dengan menggunakan komputer
- Dunia Maya
- Salah satu aplikasi jual beli online
- Salah satu aplikasi penyedia layanan transportasi
- Seseorang yang tidak begitu mahir dalam bermain
- Pembelajaran secara online
10 Clues: Dunia Maya • Pembelajaran secara online • Salah satu game online popular • salah satu aplikasi media sosial • Salah satu aplikasi jual beli online • Penghitungan dengan menggunakan komputer • Seseorang yang tidak begitu mahir dalam bermain • Salah satu aplikasi penyedia layanan transportasi • Salah satu karakter dalam profil pelajar pancasila • ...
Kiley-bullying 2022-03-11
8 Clues: name calling • online bullying • hitting,spitting,punching • someone who bully's people • moment joking or making fun of someone • subject to aggressive pressure or intimidation. • someone standing and watching people get bullied • intended to provoke or make fun of someone in a playful way.
crossword 2012-11-15
Across
- artist with the highest number of views for his\her video on youtube (3)
- brand ambassador of sony cyber shot (7)
- logo 1 (7)
- a company for which 4 sports personalities from the field of cricket, golf, football and tennis endorse (8)
- highest grossing hollywood movie (6)
- one world many states (16)
- the ultimate driving machine (3)
- logo 4 (9)
- towards excellence (4)
Down
- full form of P&G (14)
- ceo of virgin atlantic (14)
- logo 2 (10)
- subsidiary company of adidas which makes sportswear, apparel and accessories (6)
- logo 3 (5)
- world's local bank (4)
- parent company of minute maid (8)
16 Clues: logo 1 (7) • logo 3 (5) • logo 4 (9) • logo 2 (10) • full form of P&G (14) • world's local bank (4) • towards excellence (4) • one world many states (16) • ceo of virgin atlantic (14) • the ultimate driving machine (3) • parent company of minute maid (8) • highest grossing hollywood movie (6) • brand ambassador of sony cyber shot (7) • ...
Eksplorasi Merdeka 2025-08-18
Across
- Warna biru pada Jalur Gemilang melambangkan __________.
- Tema Hari Kebangsaan 2025 ialah "Malaysia MADANI:Rakyat ___________"
- Menjadi tempat pengisytiharan kemerdekaan ialah __________.
- Rukun Negara mengandungi __________ prinsip.
- Perkataan “Merdeka” dilaungkan sebanyak __________ kali pada 31 Ogos 1957.
- Bapa Kemerdekaan Malaysia ialah __________.
Down
- Bulan sabit pada Jalur Gemilang melambangkan agama __________.
- Lagu "Negaraku" diambil daripada lagu negeri ___________.
- Lagu manakah mengandungi lirik "Alam cyber teknologi terkini"
- Warna putih pada Jalur Gemilang melambangkan __________.
- Lagu "Keranamu Malaysia" menyemai semangat __________.
- Sejarah kemerdekaan Malaysia bermula dengan penjajahan oleh kuasa __________.
- Bunga kebangsaan Malaysia ialah bunga __________.
- Jata Negara mengandungi __________ ekor harimau.
- Warna yang melambangkan warna diraja.
- Sambutan kemerdekaan pada tahun 2025 adalah kali ke-6_.
16 Clues: Warna yang melambangkan warna diraja. • Bapa Kemerdekaan Malaysia ialah __________. • Rukun Negara mengandungi __________ prinsip. • Jata Negara mengandungi __________ ekor harimau. • Bunga kebangsaan Malaysia ialah bunga __________. • Lagu "Keranamu Malaysia" menyemai semangat __________. • Warna biru pada Jalur Gemilang melambangkan __________. • ...
Luke Nick and Harry 2022-04-27
Across
- The original form of a message
- The receptiveness and convenience of data
- A process of encryption named after a Roman Emperor
- A measure put in place to minimize threats
- Software that takes advantage of a flaw
- Fraudulent practice of getting personal information
- Files that have changed since last backup
- Preliminary experimentation on a system
Down
- Identifying and analyzing flaws
- Encryption that uses the same key
- Exposed to the possibility of an attack
- Magic happens after this process of plaintext
- Guessing all combinations until correct
- Restoring data
- A digital authentication of dependability: can verify authenticity.
- Simulating a potential cyber-barrage
16 Clues: Restoring data • The original form of a message • Identifying and analyzing flaws • Encryption that uses the same key • Simulating a potential cyber-barrage • Exposed to the possibility of an attack • Guessing all combinations until correct • Software that takes advantage of a flaw • Preliminary experimentation on a system • The receptiveness and convenience of data • ...
SMG Crossword Puzzle 2025-12-15
Across
- - A large company or group
- a measure of a company’s stock price relative to
- average forecast for a companies forecast
- - is the highest price and the lowest price of the stock over a 52-week
- - A debt security issues by government
Down
- Price a company will fetch in the open market by investor perception
- - measures volatility as compared to the overall stock
- a short unique abbreviation representing a public trading company or security on stock exchange
- is a loan made by an issuer (borrower) to a lender (investor).
- is a broad group of stocks often in the same industry.
- - Type of bond that includes Debt security issued by state, cities or county,
- - Company total income for selling goods or services.
- earnings.
- basis- the original price paid for an asset is used to determine capital gain or loss
14 Clues: earnings. • - A large company or group • - A debt security issues by government • average forecast for a companies forecast • a measure of a company’s stock price relative to • - Company total income for selling goods or services. • - measures volatility as compared to the overall stock • is a broad group of stocks often in the same industry. • ...
INTERNET 2023-11-29
7 Clues: web cyber_ • Revenue Service IRS • service provider IPS • engine google, yahoo, edge • a world that you join in Minecraft • this device wraps up ur sTechnologyndy • old people have a hard time understanding
Choosing A Local Church 2025-03-03
18 Clues: Plan • Creed • Godly • Fixing • Program • Meeting • Greeters • Offering • I Timothy • Scripture • Evangelist • Leadership • Fellowship • Believer's • Separation • Scriptural • Regular Memorial • Great Commission
SDLC 2024-10-22
Across
- Performed for ensuring that code changes do not introduce new vulnerabilities
- A type of testing that checks for vulnerabilities in the application
- The phase where security requirements are identified and documented.
- The process of converting source code into executable code
Down
- A security measure that involves reviewing code for vulnerabilities
- A practice of continuously integrating and testing code changes
- The final phase where the product is deployed to production.
- The phase where the system is monitored for security incidents.
- The phase where the system is designed, including security architecture.
9 Clues: The process of converting source code into executable code • The final phase where the product is deployed to production. • A practice of continuously integrating and testing code changes • The phase where the system is monitored for security incidents. • A security measure that involves reviewing code for vulnerabilities • ...
Security Awareness Crossword Puzzle 2025-07-12
Across
- What is the name of The Israeli Security Agency
- Which security device functions as a physical barrier to prevent forced entry of vehicles from entering restricted areas?
- LUX is the units of
- Any Aerial Threats across the land border by Fighter Planes or Missiles is delt by
Down
- Which Refinery unit received the Best Location Award-2024 for outstanding security practices
- Which country used DRONE for the first time for attack
- The colour of‘VIP VISITOR’ card is
- A mobile Application to grant permission online for DRONES
- The first line of defence in physical security is
9 Clues: LUX is the units of • The colour of‘VIP VISITOR’ card is • What is the name of The Israeli Security Agency • The first line of defence in physical security is • Which country used DRONE for the first time for attack • A mobile Application to grant permission online for DRONES • Any Aerial Threats across the land border by Fighter Planes or Missiles is delt by • ...
IT Definitions Crossword 2013-12-02
Across
- Ways that are allowed behaviour on webpages that support an online community.
- Action, devices or events that harm components and/or data and security stored within.
- Contributes to the way a solution works and/or appears to the user
- Ways of making sure that a solution works the way it’s intended to work/be used for.
- A large internet based storage service that allows people to store data online and access anywhere with internet access.
- Ways information should be used and organised with onscreen solutions
- Software tools that allow people to figure out thoughts and find patterns in setting out data.
- A description of the/an intended use or environments of a software solution.
- A statement that outlines a situation, context, problem or needs.
- A type of software that can run an application without the user inputting the code.
- Are obligations that individuals or companies have to respect owner’s creations and privacy information.
Down
- A way of producing required information through a technology based hardware / application.
- Software or procedures used in protecting the integrity of hardware/component and/or the files it holds.
- Devices Equipment used in protecting hardware in a secure area.
- Measurements of time, cost, and/or effort used in order to create a solution
- A process of turning RAW data into a graphic visualisation for easier analysis and explanation
- A network protocol laid out into 7 layers.
- Ways to represent the was a solution works and/or appears to the user
- The combination of people, procedures, equipment and data that create data and information
19 Clues: A network protocol laid out into 7 layers. • Devices Equipment used in protecting hardware in a secure area. • A statement that outlines a situation, context, problem or needs. • Contributes to the way a solution works and/or appears to the user • Ways information should be used and organised with onscreen solutions • ...
ASEAN 2023-09-13
Across
- Negara ASEAN dengan jumlah penduduk paling sedikit
- Kejahatan cyber crime merupakan dampak dari kemajuan
- Negara ASEAN dengan gunungapi terbanyak selain Indonesia
- Sungai Irawadi terletak di negara
- Keputusan tertinggi rapat ASEAN
- Masalah sosial negara berkembang
Down
- Sungai yang mengaliri pertanian di negara China, Myanmar, Laos
- Salah satu Sekjen ASEAN berada di negara
- Merk mobil yang berasal dari negara Malaysia
- Perjanjian AFTA di tanda tangani di negara
- Pertemuan Defence Minister Meeting (ADMM)membahas tentang
- Sungai Chao Praya mengalir di negara
- Kenampakan alam di Kampuchea yaitu dataran lacustrine, terjadi karena
- Pakaian tradisional Vietnam
- Organisasi negara-negara kawasan Asia Tenggara
15 Clues: Pakaian tradisional Vietnam • Keputusan tertinggi rapat ASEAN • Masalah sosial negara berkembang • Sungai Irawadi terletak di negara • Sungai Chao Praya mengalir di negara • Salah satu Sekjen ASEAN berada di negara • Perjanjian AFTA di tanda tangani di negara • Merk mobil yang berasal dari negara Malaysia • Organisasi negara-negara kawasan Asia Tenggara • ...
Religion, renewal and choice 2020-11-02
Across
- The term used by Hervieu-Leger to describe the loss of collective memory (2 words, no space)
- Davies' term that reflected the fact the clergy practise religion on behalf of the majority, who experience religion second hand - ________ religion.
- ___________ Security Theory. Norris and Inglehart's theory that suggests wealth influences religiosity.
- The term used by Lyon to describe the fact that religious ideas no longer exist in physical churches only because of the media.
- The phrase used by Lyon that suggests that the world is not becoming rationalised, but instead is evolving and developing new unconventional beliefs, practices and spirituality.
- Hervieu-Leger's idea that religion has become individualised and we can select our own DIY beliefs that fit with our lives (2 words, no space)
- Refers to the growing interconnectedness of societies, which has led to greatly increased movements of ideas and beliefs across national boundaries.
Down
- The theoretical perspective that is explored and supported by the research and theories from this topic (beginning with P)
- The term used by Helland to describe the new forms of 'cyber-religion' that exist that challenge traditional, hierarchical religious ideas (2 words, no space)
- Religious _________ theory. The theory created by Stark and Bainbridge to explain the differences in secularisation in America and Europe.
- Cycle of _________. Term used by Stark and Bainbridge to explain why increasing diversity in religion does not have to lead to secularisation.
- The group Hervieu-Leger described as following an individual path of self-discovery and following New Age ideas.
- Stark and Bainbridge said this was key to ensure that religion remains influential in society (starts with S)
- Davies' term that reflected the fact that people still follow religion but don't necessarily join an organisation - believing without ___________
14 Clues: The term used by Hervieu-Leger to describe the loss of collective memory (2 words, no space) • ___________ Security Theory. Norris and Inglehart's theory that suggests wealth influences religiosity. • Stark and Bainbridge said this was key to ensure that religion remains influential in society (starts with S) • ...
Collective Security & UN Peacekeeping 2018-02-13
Across
- "The individual experts who have sat on the UN Sub-Commission on Protection of ______ ..." (pg. 245)
- Rights "The Security Council can Authorize a member state or regional organization to enforce _____" (pg. 195)
- Argued that peacekeeping is internal and external & makes the UN possible
- Scene of UN inaction and extreme violence
- "The UN's ___ reflects the ____ of the member states" (pg. 575)
- Site of UN peacekeeping as a result of British and French interests
- Attempt to cut off diplomatic or economic relations with a view towards altering offensive behavior (pg.61)
- Former political officer who shed light on the inner workings of UN decision making
- Concept that is through to undermine the efficiency of the UN. Used as a defense against UN action on human rights ( pg. 240)
- War A frigid conflict that bore peacekeeping
Down
- State that asked for UN assistance during the Cold War
- Timor UN administered territory during this entity's tradition ti independence (pg.105)
- An absence of centralized democratically elected governments, market economies, & the institutions associated with Western forms of governance (pg. 38)
- At times publicly protests governmental actions & provides assistance to refugees and contracts with NGOs (pg. 218)
- Security security arrangement, political, regional, or global, in which each state in the system accepts that the security of one is the concern of all, and therefore commits to a collective response to threats to, and breaches to peace
- Factor that contributed to the prioritization of UN needs over Rwanda (pg. 573)
- Tactic used by the UNGA and UNSC to target a specific actor or set of actors with the goal of changing actions or attitudes. Results of this are minimal due to the lack of coercive power attached to them ( pg. 199)
- Reflect interests of US Mission and Washington. Collateral damage is the production of indifference
- Author who's work details the origins, inner workings, responsibilities, and organizational powers of the UN
- Knowledge about human rights is not so much scientific knowledge, however as _______ judgement" (pg. 246)
- political "Peacekeeping" was created as much to salvage the UN from its ___ crises as it was to respond to threats to international peace and security" (pg. 31)
- One of many international entities dedicated to promoting and protecting human rights (acronym)
22 Clues: Scene of UN inaction and extreme violence • War A frigid conflict that bore peacekeeping • State that asked for UN assistance during the Cold War • "The UN's ___ reflects the ____ of the member states" (pg. 575) • Site of UN peacekeeping as a result of British and French interests • Argued that peacekeeping is internal and external & makes the UN possible • ...
MGR-22 CROSSWORD CONTEST 2022-08-22
Across
- An IBM Security product that helps security teams detect, prioritize and respond to threats across the enterprise
- This IBM Research tool allows scientists and businesses to search mountains of unstructured data
- IBM worked with __________ to create a scalable CRM platform, called Customer 360, which gives every part of IBM a holistic view into the client journey and cuts time to issue resolution by 26%
- “Never trust, always verify” is the first defining principle of which model
- It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the_______
- IBM’s acquisition of __________ will help clients secure critical assets across hybrid cloud environments—and stay one step ahead of attackers
- This aerospace manufacturer announced that open source, hybrid cloud, and AI technologies from IBM and Red Hat are part of its second mission
- One-way street to persisting top secrets
Down
- Decoy computers or systems that lure hackers and cybercriminals into attacking them
- For more than three decades, IBM has helped develop and deliver innovative and engaging digital fan experiences at the which tennis championships
- IBM and the Alliance to End Plastic Waste created ________, a global information platform to solve a waste data gap
- ensure the sensitive data is accessed only by an authorized user
- A Person who uses technology to gain unauthorized access to data is called a _____
- Recent IBM security acquisition of an endpoint security company.
- First computer worm(virus) programmed to move across a network, leaving a small trail (series of signs) wherever it went was _____
- The _____________ ransomware group was involved in the recent hacking of a networking giant by compromising an employee’s personal google account.
- Cross-site scripting standing in front of a mirror
- To avoid ____________, user input should not be put directly into a database
- Vast Strides –I help in identifying Security Vulnerabilities
- A form of malware that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users
- A protocol used for directory services authentication that was first developed in 1993
- A group of protocols used to encrypt data between two communication points.
22 Clues: One-way street to persisting top secrets • Cross-site scripting standing in front of a mirror • Vast Strides –I help in identifying Security Vulnerabilities • ensure the sensitive data is accessed only by an authorized user • Recent IBM security acquisition of an endpoint security company. • ...
CyberCrossWord 2022-05-19
Across
- Any mechanisms that bypasses a normal security check; it may allow unauthorized access to functionality
- The process of verifying an identity by or for a system
- Policy A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources
- Code embedded in a program that copies itself and performs unwanted function
- The output of an encryption algorithm; the encrypted form of a message or data
- Assures that a system performs its intended function in an unimpaired manner
- Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself
- A potential security harm to an asset
- An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result
- Preserving authorized information access, or disclosure
- The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity
- Assures that a system performs its intended function in an unimpaired manner
- A random value that is concatenated with a password
- A decoy system designed to lure a potential attacker away from critical systems
Down
- Confidentiality, integrity, and availability
- Assures that information and programs are changed only in a specified and authorized manner
- An attempt to alter system resources or affect their operation
- Attack An attempt to learn or make use of information from the system that does not affect system resources
- Guarding against improper information modification or destruction
- A program that takes over another computer and it's used to launch attacks
- Program that can replicate itself and send copies from computer to computer across network connections
- Assures that individuals control what information related to them may be collected, stored, and to whom is shared to
- Assures that private information is disclosed to unauthorized individuals
- Weakness in an information system
- Function used to protect passwords that are stored in the local database
- A plastic card that can store and process data
- Assures that systems work promptly and service is not denied to authorized users
- A procedure whereby two communicating parties can cooperate to acquire a shared secret key
- Key A temporary encryption key used between two principals
- The conversion of plaintext data into unintelligible form
30 Clues: Weakness in an information system • A potential security harm to an asset • Confidentiality, integrity, and availability • A plastic card that can store and process data • A random value that is concatenated with a password • The process of verifying an identity by or for a system • Preserving authorized information access, or disclosure • ...
Stock market terms 2023-10-25
Across
- max number of shares a publicly traded company can issue as specified in its articles of incorporation
- the money borrowed from a broker to purchase an investment
- when investors buy ownership of the shares of the company
- a period of time in a financial markets when the price of an asset or security continuously
- an intermediary between an investor and a security exchange
- a reward paid to the shareholders for their investment in a company's equity
- a period of sustained increases in the prices of stocks, bonds, or related indexes
- an order to buy/sell at the markets current available price
- the lowest price at which a seller will sell the stock
- The highest price a buyer will pay for a number of shares
- the standard deviation of a stocks annualised returns
- filling a buy/sell order in the market subject to conditions placed on the order by the end client
- to close out a position in a stock b/c price decline
- long means you own the security
- The foreign exchange market
Down
- execute a trade at a specific price that expires if not completed
- an order to buy/sell with a restriction
- a pooled collection of assets that invests in stocks, bonds, and other securities
- a trading strategy where an individual buys and sells (or sells and buys) the same security in a margin account on the same day in an attempt to profit from small movements in the price of the security.
- Measure of volatility
- a marketplace where securities, commodities, derivatives and other financial instruments are traded.
- the amount by which the ask price exceeds the bid price for an asset in the market
- a declining market
- number of shares traded between its daily open and close
- When a company first sells a stock to the public
- total value of all a companies shares of stock
- purchasing additional shares of a previously initiated investment after the price dropped
- collection of financial investments
- a statistic that captures the average change in a data series over time
- how much income an investment generates, separate from the principal.
30 Clues: a declining market • Measure of volatility • The foreign exchange market • long means you own the security • collection of financial investments • an order to buy/sell with a restriction • total value of all a companies shares of stock • When a company first sells a stock to the public • to close out a position in a stock b/c price decline • ...
Stock market terms 2023-10-25
Across
- max number of shares a publicly traded company can issue as specified in its articles of incorporation
- the money borrowed from a broker to purchase an investment
- when investors buy ownership of the shares of the company
- a period of time in a financial markets when the price of an asset or security continuously
- an intermediary between an investor and a security exchange
- a reward paid to the shareholders for their investment in a company's equity
- a period of sustained increases in the prices of stocks, bonds, or related indexes
- an order to buy/sell at the markets current available price
- the lowest price at which a seller will sell the stock
- The highest price a buyer will pay for a number of shares
- the standard deviation of a stocks annualised returns
- filling a buy/sell order in the market subject to conditions placed on the order by the end client
- to close out a position in a stock b/c price decline
- long means you own the security
- The foreign exchange market
Down
- execute a trade at a specific price that expires if not completed
- an order to buy/sell with a restriction
- a pooled collection of assets that invests in stocks, bonds, and other securities
- a trading strategy where an individual buys and sells (or sells and buys) the same security in a margin account on the same day in an attempt to profit from small movements in the price of the security.
- Measure of volatility
- a marketplace where securities, commodities, derivatives and other financial instruments are traded.
- the amount by which the ask price exceeds the bid price for an asset in the market
- a declining market
- number of shares traded between its daily open and close
- When a company first sells a stock to the public
- total value of all a companies shares of stock
- purchasing additional shares of a previously initiated investment after the price dropped
- collection of financial investments
- a statistic that captures the average change in a data series over time
- how much income an investment generates, separate from the principal.
30 Clues: a declining market • Measure of volatility • The foreign exchange market • long means you own the security • collection of financial investments • an order to buy/sell with a restriction • total value of all a companies shares of stock • When a company first sells a stock to the public • to close out a position in a stock b/c price decline • ...
Tormentos - Bully free themed crossword puzzle 2025-12-08
Across
- Abusive language or insults
- Showing behavior that is considerate of other people
- The feeling of being ashamed
- Displaying kindness or concern for others
Down
- To frighten someone
- bullying A name for digital bullying
- Not allowing someone or something to take part in a activity
- To give someone support or confidence
- Tormentos without the s
9 Clues: To frighten someone • Tormentos without the s • Abusive language or insults • The feeling of being ashamed • bullying A name for digital bullying • To give someone support or confidence • Displaying kindness or concern for others • Showing behavior that is considerate of other people • Not allowing someone or something to take part in a activity
12 Days of Christmas ITHD Puzzle 2024-12-09
Across
- a link to something in a website.
- Collection of professional creative software made by Adobe.
- a secret word or phrase that must be used to gain admission to something.
- Prevents unauthorized access to a disk's contents, even if the disk is offline.
- Specialized computer or software designed to provide services, data or resources to other computers, over a network.
Down
- The practice of protecting devices, networks and programs from digital attacks.
- Creates a private connection between your computer and a remote server.
- The programs and other operating information used by a computer.
- Person who breaches computer security
- Group of devices connected within a limited area, such as a home, office or building.
- A network security device that monitors and filters incoming and outgoing network traffic based on an org's security policies.
- Programming error
- Unsolicited email
- Temporary data storage
14 Clues: Programming error • Unsolicited email • Temporary data storage • a link to something in a website. • Person who breaches computer security • Collection of professional creative software made by Adobe. • The programs and other operating information used by a computer. • Creates a private connection between your computer and a remote server. • ...
Valentine's Security Crossword 2023-02-08
Across
- Mixing cocoa, cocoa butter, milk and sugar= result.
- ____________ and a Gentleman
- Common candy heart phrase.
- The act of bringing something to an end.
- Small cherub that brings couples together.
- Main drive running east to west.
- Gene Simmons is the lead singer of this band since 1973.
- A ______ by any other name would smell as sweet.
- Rosa, Dianthus and Alstroemeria are the scientific names for?
Down
- The program for keeping eyes on all the things.
- Guests that enter the building as workers
- Visitors for success track days.
- Wifi __________ changes each month.
- Pumps about 1.5 gallons of blood every minute
- Second part of ILY
15 Clues: Second part of ILY • Common candy heart phrase. • ____________ and a Gentleman • Visitors for success track days. • Main drive running east to west. • Wifi __________ changes each month. • The act of bringing something to an end. • Guests that enter the building as workers • Small cherub that brings couples together. • Pumps about 1.5 gallons of blood every minute • ...
Robbery, Safety & Security 2021-10-21
Across
- "The ____ is ready"
- _______ situation
- ________ Officer
- A robber is committing a _______
- You are supposed to _________ with the robber.
- Remain ____!
- listen _______
Down
- __________ location
- Always consult the Robbery __________
- _________ aka blackmail
- ____ Threat Procedures
- Ask _________
- color of your robbery book
- extortion phone ____
- ____ clear signal
15 Clues: Remain ____! • Ask _________ • listen _______ • ________ Officer • _______ situation • ____ clear signal • __________ location • "The ____ is ready" • extortion phone ____ • ____ Threat Procedures • _________ aka blackmail • color of your robbery book • A robber is committing a _______ • Always consult the Robbery __________ • You are supposed to _________ with the robber.
SECURITY AWARENESS PUZZLE 2023-09-20
Across
- Acronym for the Central Intelligence Agency
- Classified material must never be stored in your office?
- Visitors must have an ___ at all times
- This must be worn at all times when entering, exiting and within all company locations
- Classified material must NEVER be brought to your?
- Acronym for Communications Security
- If an unauthorized individual has seen classified material the the material has been?
- This is any information that reflects unfavorably on the loyalty, integrity and character of employees who hold a security clearance
Down
- Access to classified information requires a clearance and a (3 words)
- AREA Name of the area in a facility where classified computer equipment is openly stored (two words)
- Acronym for a classified computer in a closed area
- An orange stripe on an visitor's badge indicates that the visitor is a?
- What does the acronym FOUO stand for?
- Acronym for Department of Defense?
- Where must classified documents be secured at the end of the workday?
15 Clues: Acronym for Department of Defense? • Acronym for Communications Security • What does the acronym FOUO stand for? • Visitors must have an ___ at all times • Acronym for the Central Intelligence Agency • Acronym for a classified computer in a closed area • Classified material must NEVER be brought to your? • Classified material must never be stored in your office? • ...
Information Security - Crossword 2024-03-25
Across
- A security protocol that provides secure communication over a network, often used for remote access
- A type of authentication that verifies a user's identity based on physical characteristics
- A security measure that restricts access based on the principle of least privilege
- A cryptographic key that is kept secret and used for decrypting data
- A protocol used to secure email communication
- A program or device that identifies and authenticates a user's identity electronically
- An attack that involves intercepting and altering communication between two parties
- A method of encrypting data that uses a single key for both encryption and decryption
Down
- The act of tricking individuals into revealing sensitive information
- A type of attack that uses social engineering to manipulate individuals into taking specific actions
- A type of malware that hides its presence and can perform malicious actions without user knowledge
- A type of attack that floods a system with excessive traffic to disrupt normal operation
- A security incident response plan to restore systems and operations after an attack
- A technique used to ensure data integrity by creating a unique hash value for a file
- Software used to detect and prevent unauthorized access to a computer network
15 Clues: A protocol used to secure email communication • The act of tricking individuals into revealing sensitive information • A cryptographic key that is kept secret and used for decrypting data • Software used to detect and prevent unauthorized access to a computer network • A security measure that restricts access based on the principle of least privilege • ...
Security Audit Quiz 2025-11-18
Across
- The probability of a threat exploiting a vulnerability.
- NIST CSF function focused on safeguarding assets
- Final step of an audit process.
- Checking compliance to documented requirements.
- A weakness that can be exploited.
- A potential cause of an unwanted incident.
- Ability to track actions back to individuals or systems.
- U.S. body responsible for cybersecurity standards.
Down
- The defined boundary of an audit.
- measures implemented to reduce risk.
- Level of harm from a compromise.
- Unauthorized attempt to access a system.
- Critical element of CIA triad.
- Testing to confirm proper implementation.
- Adhering to required standards or regulations.
15 Clues: Critical element of CIA triad. • Final step of an audit process. • Level of harm from a compromise. • The defined boundary of an audit. • A weakness that can be exploited. • measures implemented to reduce risk. • Unauthorized attempt to access a system. • Testing to confirm proper implementation. • A potential cause of an unwanted incident. • ...
CHAPTER 18 TERMS 2020-09-10
Across
- Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
- contain events triggered by applications or programs determined by their programmers
- Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
- the facility to which the message refers.
- a device that test the speed of data transfer in the network.
- are used to determine whether your network meets specific International Organization for Standardization or Telecommunication Industry Association standards.
- detects unwanted attempts to manipulate network systems and/or environments
- a single digit code from 0 to 7 that indicates the severity of the message.
- most popular form of TCP scanning
- displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
- is a device that transmits signals through each wire copper twisted pair to determine if it is connected to the correct pin at the other end.
- used for sniffing wireless networks
- protocol analyzers such as load testing, connectivity testing, and throughput testing.
- contain events generated by Windows system component, including drivers and services that started or failed to start.
- the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
- analyzes protocols
- looks inside every packet on a network segment.
Down
- text string containing detailed information about the even being reported.
- the standard level of performance of a certain device or to the normal operating capacity for your whole network.
- date and time of a message.
- a text string that uniquely describes the message.
- a diagnostic procedure in which a signal is transmitted and returned to the sending device after passing through all or a portion of a network circuit.
- a powerful enterprise (large corporate environment) network intrusion and prevention system.
- a device that test the speed of data transfer in the network.
- contain security events like valid logon attempts and potential security problems
- a term for software products and services combining security information management and security event management.
- is a line tester designed to check a copper cable connection for basic installation problems like opens, shorts, and crossed pairs.
- stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
- sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
- a software tool designed to search a host for open ports.
- a combination cable tester and network analyzer, only better because it comes with more options.
- is a computer security device that monitors network and/or system activities for any strange or malicious behavior
- scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
- a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
- Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
- supports plaintext authentication with community strings and uses only UDP.
- an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.
37 Clues: analyzes protocols • date and time of a message. • most popular form of TCP scanning • used for sniffing wireless networks • the facility to which the message refers. • looks inside every packet on a network segment. • a text string that uniquely describes the message. • a software tool designed to search a host for open ports. • ...
Chapter 3: Access Control 2014-10-22
Across
- The absence or weakness of a safeguard that could be exploited.
- A subject provides some type of data to an authentication service. First step in the authentication process.
- An access policy that restricts subjects’ access to objects based on the security clearance of the subject and the classification of the object. The system enforces the security policy, and users cannot share their files with other users.
- A security principle that makes sure that information and systems are not modified maliciously or accidentally.
- Administrative, physical, or technical control that is designed to detect and prevent unauthorized access to a resource or environment.
- A list of subjects that are authorized to access a particular object. Typically, the types of access are read, write, execute, append, modify, delete, and create.
- A security principle that works to ensure that information is not disclosed to unauthorized subjects.
- Software employed to monitor and detect possible attacks and behaviors that vary from the normal and expected activity. The IDS can be network based, which monitors network traffic, or host based, which monitors activities of a specific system and protects system files and control mechanisms.
- When used within computer security, identifies individuals by physiological characteristics, such as a fingerprint, hand geometry, or pattern in the iris.
- A passive entity that contains or receives information. Examples include records, pages, memory segments, files, directories, directory trees, and programs.
- A form of attack in which an attacker uses a large set of likely combinations to guess a secret, usually a password.
- The reliability and accessibility of data and resources to authorized individuals in a timely manner.
- A chronological set of logs and records used to provide evidence of a system’s performance or activity that took place on the system. These logs and records can be used to attempt to reconstruct past events and track the activities that took place, and possibly detect and identify intruders.
- A security principle indicating that individuals must be identifiable and must be held responsible for their actions.
Down
- Granting access to an object after the subject has been properly identified and authenticated.
- A computer set up as a sacrificial lamb on the network in the hope that attackers will attack this system instead of actual production systems.
- An access control model and policy that restricts access to objects based on the identity of the subjects and the groups to which those subjects belong. The data owner has the discretion of allowing or denying others access to the resources it owns.
- To verify the identity of a subject requesting the use of a system and/or access to network resources. The steps to giving a subject access to an object should be identification, _____, and authorization.
- The three security principles: availability, integrity, and confidentiality.
- An attack that continually tries different inputs to achieve a predefined goal, which can be used to obtain credentials for unauthorized access.
- Type of model that provides access to resources based on the role the user holds within the company or the tasks that the user has been assigned.
- An active entity, generally in the form of a person, process, or device, that causes information to flow among objects or that changes the system state.
22 Clues: The absence or weakness of a safeguard that could be exploited. • The three security principles: availability, integrity, and confidentiality. • Granting access to an object after the subject has been properly identified and authenticated. • A security principle that works to ensure that information is not disclosed to unauthorized subjects. • ...
AWS Quiz III 2022-06-10
Across
- is an edge computing, data migration, and edge storage device that comes in two Options.
- is a cloud-based hardware security module that enables you to easily generate and use your own encryption keys on the AWS Cloud.
- is a highly available and scalable cloud Domain Name System (DNS) web service.
- provides a single location to track the progress of application migrations across multiple AWS and partner solutions
- is a service that enables customers to connect their Amazon Virtual Private Clouds (VPCs) and their on-premises networks to a single gateway
- is a data transfer service that makes it easy for you to automate moving data between on-premises storage and Amazon S3 or EFS.
- is an object storage service that offers industry-leading scalability, data availability, security, and performance.
- is a fully managed service that makes it easy for developers to create, publish,maintain, monitor, and secure APIs at any scale.
- lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily
- provides alerts and remediation guidance when AWS is experiencing events that might affect you.
- is a security service that uses machine learning to automatically discover, classify, and protect PII in S3 buckets.
- provides on-demand access to AWS’ security and compliance reports and select online agreements.
Down
- makes it easy to establish a dedicated network connection from your premises to AWS.
- running on AWS
- is a threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.
- gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.
- can migrate your data to and from most widely used commercial and open-source databases.
- is a managed Distributed Denial of Service (DDoS) protection service that safeguards web
- is a networking service that improves the availability and performance of the applications that you offer to your global users.
- enables you to build flexible, cloud-native directories for organizing hierarchies of data along multiple dimensions
- provides a unified user interface so you can view operational data from multiple AWS services and allows you to automate operational tasks across your AWS resources.
- is a service that makes it easy to develop, test, and deploy intelligent robotics applications at scale
- provides a simple, scalable, elastic file system for Linux-based workloads for use with AWS Cloud services and on-premises resources.
- is a networking service that helps establish secure connections between your on-premises networks,remote offices, client devices, and the AWS global network.
- is a hybrid storage service that allows your on-premises applications to seamlessly use AWS cloud storage.
- makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.
- is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
- helps you create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
28 Clues: running on AWS • is a highly available and scalable cloud Domain Name System (DNS) web service. • makes it easy to establish a dedicated network connection from your premises to AWS. • is an edge computing, data migration, and edge storage device that comes in two Options. • ...
Final Crossword 2025-06-11
Across
- A network device that can forward packets across different computer networks
- small number of passwords used when trying several different user accounts
- tool that provides a visual representation of the wireless signal
- A framework for transporting authentication protocols
- Having a high tolerance for risk
- A device that distributes resources and services to devices connected to the network
- An access control scheme that is the most restrictive
- A downgrade attack
- A systematic approach to dealing with transformations within an organization
- The retrieval of difficult-to-obtain data
- Threat intelligence data that has been legally gathered
- denial of the truth or validity of something
- Vulnerability for which there are no days of advanced warning
- Employee choose from company-approved devices
- Redirecting users to fake websites to steal data
- Installing software security updates
- replaces SSL
- A standard of normal activities
- A device that distributes work across a network
- Infecting frequented websites with malware
- bogus requests to overwhelm the recipient
- Addressing a risk by making the risk less serious
- Unnecessary ports that are not disabled
- A product that consolidates real-time security monitoring and management
- pay security researchers who uncover security bugs
- Using more than one type of authentication credential
- An AP set up by an attacker to mimic an authorized AP
- An attack in which threat actors introduce something into RAM
- retains historical documents
Down
- ensure critical data is protected
- server within the DMZ that is used to connect two dissimilar security zones
- Taking a “picture” of the state of the data repeatedly
- software embedded into hardware
- Isolating systems that have been compromised
- Simplifies the process of building, deploying, and managing containerized applications
- A device that maintains power to equipment in case of an interruption
- An certificate that uses an asterisk to cover multiple subdomains
- evidence or proof of something
- VM breaking out to interact with host OS
- Directly probing for vulnerabilities
- is a finite sequence of rigorous instructions
- A creative invention or work with rights
- digital fingerprints
- refers to integrating security into the application
- Combining two or more devices to appear as a single unit
- Numeric scores on a vulnerability
- captures and stores each keystroke that a user types on the computer’s keyboard
- The state or fact of something being likely or possible
- Tools that allow a device to be managed remotely by an organization
- A protocol suite for securing Internet Protocol (IP) communications
- use of technology without the knowledge of the official IT department
- A coding technique for accounting for errors
- An incident response testing exercise that is a monthly 30-minute discussion
- threat actor gains illicit access of elevated rights or privileges
- enables users to access a network resource through a directory service
- unauthorized copying of data
- Intentionally flooding the radio frequency spectrum
- Having little tolerance for risk
- isolate the failure of a server and storage resources from cloud users
- Procedures needed if a “roll back”
- Converting data into unreadable form for security
61 Clues: replaces SSL • A downgrade attack • digital fingerprints • unauthorized copying of data • retains historical documents • evidence or proof of something • software embedded into hardware • A standard of normal activities • Having a high tolerance for risk • Having little tolerance for risk • ensure critical data is protected • Numeric scores on a vulnerability • ...
Financial Math 2021-09-20
Across
- often offer to their employees in which they don't report to work
- - set amount of money that a worker receives for each item the individual produces.
- - The set number of hours that an employee is expected to work.
- covers only the individual to the extent outlined
- paid time off
- payroll tax deducted to fund the Social Security and Medicare programs
- formula to determine weekly benefits.
- total pay which is the sum of an employees hourlypay and overtime pay
- - the compensation that is paid to the owner of an asset based on income earned
- type of retirement plan where an employee receives compensation
- allows employees to buy or receive company stocks
- covers all members of the immediate family for health care bills to the extent outlined
- maximum income on which a person must pay social security tax in given year
- hourly rate that federal law allows as the least hourly rate
- paid time off to care for sick children or newborns.
- - work paid for according to the amount produced
- amount of social security a worker pays depends on the social security percentage and the maximum taxable income for that year
- - extra hours an employee works beyond their regular hours
- A government program that offers benefits to eligible employees who, through no fault on their own, have become unemployed
Down
- nine digit number that identifies a resident of united states
- - twice a month
- - provides income to people who retire, become disabled, or who receive survivors benefits.
- - The hourly rate an employee usually gets paid for overtime hours.
- employers may offer to save for retirement
- - Payroll or other types of checks that are directly and electronically deposited into a bank account.
- - every two weeks
- - what you are getting paid by hour
- Assistance to employees who are injured while working at their job
- An overtime rate that is two times the hourly rate.
- money that employers and employer contribute to social security and medicare
- - hourly wage an employee receives for any overtime hours.
- form of noncash compensation received in addition to a wage or salary
- - health, life, and disability
- - a fee paid for services, usually a percentage of the total cost
- employee pays is a set percentage of entire income with no maximum
35 Clues: paid time off • - twice a month • - every two weeks • - health, life, and disability • - what you are getting paid by hour • formula to determine weekly benefits. • employers may offer to save for retirement • - work paid for according to the amount produced • covers only the individual to the extent outlined • allows employees to buy or receive company stocks • ...
Cyber-bullying Crossword 2023-05-04
Across
- Which foundation is run by the government
- About 50% of ----- students experience online harrassment
- Who are most affected by cyberbullying
- Cyberbullying is a ...
- Where is cyberbullying most found
- Who did we write our letter too
- Our global issue
Down
- What social media platform has the highest percentage of reported harassment
- “Being a victim of cyberbullying has a greater effect on adolescents’ -------- and suicidal ideation”
- Mental issues ----- with the use of social media
- Scott Freeman is the Founder of what Foundation
- Ross Ellis is the Founder of what Foundation
- What rates are tied to cyberbullying
13 Clues: Our global issue • Cyberbullying is a ... • Who did we write our letter too • Where is cyberbullying most found • What rates are tied to cyberbullying • Who are most affected by cyberbullying • Which foundation is run by the government • Ross Ellis is the Founder of what Foundation • Scott Freeman is the Founder of what Foundation • ...
CYBER FEST CROSSWORD 2025-01-23
Across
- Cybercrime that uses fake emails to trick people into people sharing personal information
- Digital currency
- Any type of harmful software designed to damage or disrupt a computer system
- a machine programmed by a computer capable of carrying out actions automatically
- a collection of instructions, data, or computer programs that enable a computer to perform specific tasks
- AI
- Common Gateway Interface
- an intentional act of compromising computer systems
Down
- VR
- Virtual computer world
- Characters used to verify identity
- Act of gaining access to a computer, database or system
- A global computer network
13 Clues: VR • AI • Digital currency • Virtual computer world • Common Gateway Interface • A global computer network • Characters used to verify identity • an intentional act of compromising computer systems • Act of gaining access to a computer, database or system • Any type of harmful software designed to damage or disrupt a computer system • ...
Digital citizenship 2018-08-25
Across
- A program used to view webpages on the Internet; ex: Internet Explorer, Firefox, Safari or Chrome.
- A person who posts comments just to get a rise out of people and cause a distraction online.
- Being a member of and supporting your community and country. They have both rights and responsibilities.
- Is your right to determine what information you would like others to know about you.
- Using fake names, posing as someone else, or creating a fake profile about someone else.
- People who witness the actions of the bully and the reactions of the victim(s), without taking action.
- When someone tries to mislead the person into giving away information, such as a username, password or credit card details, by pretending to be a legitimate website when communicating electronically.
- Someone who accesses computer information without permission.
- The secret word you use when signing in to the Internet or an online service that helps to confirm your identity.
- More serious
- Physical, emotional and mental limits we set to protect ourselves from being manipulated, used, or harmed by others.
- Saying mean things in ALL CAPS with the intention to embarrass/humiliate.
- An extra (a second)layer of security
- The use of digital media tools such as the Internet and cell phones to deliberately and repeatedly hurt, harass, or embarrass someone else.
Down
- Information that can be used to identify you, such as your age, gender, how many brothers and sisters you have, your favorite food, address, telephone number, school, etc.
- The way something sounds and the feelings it expresses.
- To shut off another user's access to viewing your information on a social media site.
- A crime that happens when someone gets the personal information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money.
- To add a descriptive word, label, or phrase to a photo or video.
- A word you use when looking for information on a search engine (Google, Yahoo, etc).
- To annoy someone repeatedly. For example, cursing at, following, or mocking someone online.
- To change something that is written to make it better.
- Anyone who can see information about you or posted by you online.
- Bombarding someone with messages over digital media or repeated content when it is least expected.
- Less serious
- A graphic (picture, image) that you use to represent yourself on the Internet.
- Lasting a long time, if not forever, such as information that one posts online that does not go away because it is passed on and spread.
- Having an unknown identity
- Symbols you can type that show how you feel
- Being aware of, sensitive to, and understanding what someone else is feeling or experiencing.
- To change the way something looks.
- Someone who acts in an aggressive, hostile, or hurtful manner toward others.
32 Clues: Less serious • More serious • Having an unknown identity • To change the way something looks. • An extra (a second)layer of security • Symbols you can type that show how you feel • To change something that is written to make it better. • The way something sounds and the feelings it expresses. • Someone who accesses computer information without permission. • ...
It's a crazy world out there! 2016-08-12
16 Clues: muovi • maali • vanki • paeta • roskat • piirre • totuus • onneksi • palvelu • päättää • sivistys • yllättävä • epäsuosittu • turvallisuus • viranomaiset • vieraanvarainen
1234 2023-10-13
17 Clues: prom • port • tunel • bagaż • odloty • bramka • podróż • pasażer • ocjrona • dogodny • motocykl • mikrobus • bagażnik • dostrzeć • ciężarówka • przepłynąć • przepłynąć
Networking Concepts , Cyber Ethics 2025-06-15
bullying 2023-11-28
8 Clues: games • An saying rude things • An when you hurt someone. • An hurting with your feet. • An you listen to people with ______. • bullying An hurting someones feelings • An talking when someone else is talking. • bullying An when you bully someone on ticktock,you tube
GLOBAL POLITICS U4 AOS2 2022-09-12
Across
- rights afforded to all human beings
- move across borders searching protection
- peaceful means to enforce int'l laws
- defined territory occupied by an entity
- state of panic due to a dispute
- Power concentrated to a singular leader
- approved by the head of state of a state
- involving in affairs of other actors
- use of violence to achieve an agenda
- System where actors control wealth
Down
- amount of money necessary to survive
- provide security and political stability
- use of armed force between parties
- global interaction among states
- popular uprising
- internal conflict in a state
- questions of morality
- to be safe from harm
- exercise legitimate political authority
- violations of the laws of war
- states conduct their foreign relations.
21 Clues: popular uprising • to be safe from harm • questions of morality • internal conflict in a state • violations of the laws of war • global interaction among states • state of panic due to a dispute • use of armed force between parties • System where actors control wealth • rights afforded to all human beings • amount of money necessary to survive • ...
travel vocab 2020-04-08
Across
- security agent
- to board
- car wagon
- to check luggage
- bunk
- to miss
- seat
- visa
- international airport
- ticket
- to land
- to see
- carry on luggage
- waiting room
- baggage claim
- platform
- departure
- counter
- first class
- safety belt
- flight attendant
- suitcase
- stop
- window
Down
- ticket
- to take off
- layover
- to get/obtain
- luggage screening
- boarding pass
- second class
- delayed
- passport
- to turn
- on time
- to hope
- aisle
- to go straight
- coach
- connection
- customs
- trip travel
- arrival
- passenger
- gate
- controller
- to go through security
- sleeping car
- ticket window
- event ticket
50 Clues: bunk • seat • visa • gate • stop • aisle • coach • ticket • ticket • to see • window • layover • delayed • to turn • on time • to hope • to miss • to land • customs • arrival • counter • to board • passport • platform • suitcase • car wagon • passenger • departure • connection • controller • to take off • trip travel • first class • safety belt • second class • waiting room • sleeping car • event ticket • to get/obtain • boarding pass • baggage claim • ticket window • ...
Cyberbullying 2022-05-09
Across
- If you are being cyberbullied, you should keep _____ of their messages
- A type of worry that can be caused by cyberbullying
- Online harassment
- Extreme sadness
Down
- Sometimes a cyber bully may create a fake ___
- Online information: social
- Messaging between phones
- A popular video-viewing app
- If you are being cyberbullied, you should tell a _____ adult
- Not risky
- One way to defend against a cyberbully
- A messaging app whose icon is a little ghost
12 Clues: Not risky • Extreme sadness • Online harassment • Messaging between phones • Online information: social • A popular video-viewing app • One way to defend against a cyberbully • A messaging app whose icon is a little ghost • Sometimes a cyber bully may create a fake ___ • A type of worry that can be caused by cyberbullying • ...
HIPAA 2024-07-12
Across
- The type of safeguard that lays out the policies and procedures that a covered entity must implement.
- The I in HIPAA stands for __________.
- The type of safeguard that protects ePHI and who has access to it.
- The two main HIPAA rules are the _______ Rule and Security Rule.
- The P in HIPAA stands for __________.
- The security rule ensures _________, integrity, and security of PHI.
- Healthcare providers, health plans, and healthcare clearinghouses are covered _________.
- 58% of people have lied to their physican due to fear of _________ or embarrassment.
Down
- The type of safeguard that protects the physical environment that the PHI is stored and accessed in.
- A _________ action plan may be required to return to HIPAA standards after a violation.
- The first A in HIPAA stands for ________.
- The maximum number of years you can serve in jail for a HIPAA violation.
- The e in ePHI stands for _________.
- The penalties of a HIPAA violation are jail time or a substantial _______.
- The P in PHI stands for _________.
- HIPAA protects the ________.
16 Clues: HIPAA protects the ________. • The P in PHI stands for _________. • The e in ePHI stands for _________. • The I in HIPAA stands for __________. • The P in HIPAA stands for __________. • The first A in HIPAA stands for ________. • The two main HIPAA rules are the _______ Rule and Security Rule. • The type of safeguard that protects ePHI and who has access to it. • ...
social media 2016-09-09
Across
- strange people
- keep safe from harm
- everybody has rights
- having an obligation to do something
- bullying the use of electronic communication to bully a person
- being free from being observed or disturbed by other people
- footprint a trail of data you create while using the Internet
- a group
Down
- a thing made to be similar or identical to another
- outline of something, especially a person's face
- putting a status on social media
- a bad group of people
- someone you don't know
- to be very involved in the internet
- ok at and comprehend the meaning
15 Clues: a group • strange people • keep safe from harm • everybody has rights • a bad group of people • someone you don't know • putting a status on social media • ok at and comprehend the meaning • to be very involved in the internet • having an obligation to do something • outline of something, especially a person's face • a thing made to be similar or identical to another • ...
Bullying 2012-10-30
Across
- deliberately harassing someone is b_______
- When you force someone to do something
- Bully someone without words, non-______
- You can bully someone ph______y
- When you bully someone with hand/body language
- You leave someone out of an activity or group
- th_____n (8 letters
- bullying someone online
Down
- you can bully someone m_____y
- You do it on purpose
- bullying can upset you and make you e________ (9 letters)
- 10 letter word h________t
- ______ 0 is the number you call for the fire/ambulance/police
- When you bully someone by calling someone names
- when you get mad feeling
15 Clues: You do it on purpose • th_____n (8 letters • bullying someone online • when you get mad feeling • 10 letter word h________t • you can bully someone m_____y • You can bully someone ph______y • When you force someone to do something • Bully someone without words, non-______ • deliberately harassing someone is b_______ • You leave someone out of an activity or group • ...
iBoy by Samuel Opferman 2015-03-24
Across
- Having an unknown name
- influence neural activity
- lack of strength
- a Greek philosopher and scientist born in Stagirus, northern Greece, in 384 BCE. His father, Nicomachus
- a combination of ingredients used in cooking or baking.
- computer network
Down
- Causing great astonishment, amazement, or dismay
- The supervising And continuing of an action to completion
- a lizard that chargés color
- Of or proceeding from the basic structure or nature of a person or thing;
- Having no limits
- In fact or to all purposes; practically
- to hold back
- Refusing to give up or let go; persevering obstinately.
- a power source
15 Clues: to hold back • a power source • Having no limits • lack of strength • computer network • Having an unknown name • influence neural activity • a lizard that chargés color • In fact or to all purposes; practically • Causing great astonishment, amazement, or dismay • Refusing to give up or let go; persevering obstinately. • a combination of ingredients used in cooking or baking. • ...
ASEAN 2023-09-13
Across
- Negara ASEAN dengan jumlah penduduk paling sedikit
- Kejahatan cyber crime merupakan dampak dari kemajuan
- Negara ASEAN dengan gunungapi terbanyak selain Indonesia
- Sungai Irawadi terletak di negara
- Keputusan tertinggi rapat ASEAN
- Masalah sosial negara berkembang
Down
- Sungai yang mengaliri pertanian di negara China, Myanmar, Laos
- Salah satu Sekjen ASEAN berada di negara
- Merk mobil yang berasal dari negara Malaysia
- Perjanjian AFTA di tanda tangani di negara
- Pertemuan Defence Minister Meeting (ADMM)membahas tentang
- Sungai Chao Praya mengalir di negara
- Kenampakan alam di Kampuchea yaitu dataran lacustrine, terjadi karena
- Pakaian tradisional Vietnam
- Organisasi negara-negara kawasan Asia Tenggara
15 Clues: Pakaian tradisional Vietnam • Keputusan tertinggi rapat ASEAN • Masalah sosial negara berkembang • Sungai Irawadi terletak di negara • Sungai Chao Praya mengalir di negara • Salah satu Sekjen ASEAN berada di negara • Perjanjian AFTA di tanda tangani di negara • Merk mobil yang berasal dari negara Malaysia • Organisasi negara-negara kawasan Asia Tenggara • ...
twitter 2013-11-21
9 Clues: online chat room • and app for evry on • where ypu text online • online chat for blackbery • it is the oppisite of good • bullying bulliying on line • it is the oppisite of being nice • a socal media website where you tweet • you know is where someone thinks they know best on the internet
