cyber security Crossword Puzzles
SSHE 2023-11-16
16 Clues: sasdfalsdf • sdkjfalskf • sdkjfalskjf • dkjflsadkjf • asdkjfaksdjf • askdjfaskdjf • adflkajsdlkfj • alsdkjfalkdjf • asdkjflaskdjf • kasjdflkasjfl • askdjfalkdjfals • kdjfalskdjfalsk • sadkjfalklsdjfa • kasdjfalskdjflaks • sdkjfalskdjfalsdkjf • askdjfalklsjdfladsk
Gun control vocabs 2024-11-14
16 Clues: stop • poll • topic • weapon • safety • firearms • necessary • beagainst • reachable • supporter • debatable • remainder • reachagoal • carryaweapon • owningaweapon • groupofinterests
Networking Concepts , Cyber Ethics 2025-06-15
Лудкечпи 2020-03-10
20 Clues: цель • опора • лэптоп • быстрый • код,шифр • страшный • масса,куча • добиваться • запутанный • надёжность • доступность • последствие • безопасность • осведомленность • злоупотребление • нарушитель защиты • целостность данных • результат, проблема • финансовые средства • средства, имущество
german vocab 2023-02-22
20 Clues: name • hail • beer • press • stove • movie • pillow • school • garden • victory • courage • security • treasure • recovery • to drive • negotiation • grandmother • to recommend • to waste or squander • marriage license bureau
Ch 10 crossword 2024-02-23
20 Clues: ID • late • delay • aisle • going • trunk • aboard • window • runway • takeoff • on time • to land • passport • to board • passenger • automatic • depart time • compartment • flight number • security checkpoint
Chromebook Crossword 2023-05-29
21 Clues: apps • fast • word • cover • excel • gaming • simple • safety • storage • browser • pointer • working • privacy • internet • on paper • gamepass • protection • connection • powerpoint • operating system • maximum boot up seconds
En el aeropuerto 2023-10-02
20 Clues: city • gate • screen • flight • country • check-in • passport • security • arrivals • suitcase • elevator • car hire • airplane • passenger • departures • hand luggage • baggage claim • boarding pass • currency exchange • tourist information
Security Controls 2022-05-30
Across
- A control acts to eliminate or reduce the impact of an intrusion event
- a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
- A control that acts to eliminate or reduce the likelihood that an attack can succeed
- The security controls that provide oversight of the information system.
Down
- A type of security control that discourages intrusion attempts
- A control may not prevent or deter access, but it will identify and record any attempted or successful intrusion
- A type of security control that acts against in-person intrusion attempts
- Security controls focused on the things done by people.
- The hardware and software components that protect a system against cyberattacks.
9 Clues: Security controls focused on the things done by people. • A type of security control that discourages intrusion attempts • A control acts to eliminate or reduce the impact of an intrusion event • The security controls that provide oversight of the information system. • A type of security control that acts against in-person intrusion attempts • ...
end of 2019 2019-12-30
Across
- salah satu jenis kopi
- merk kalkulator di toko
- pahlawan di uang Rp2000 "M.husni hoesni ....."
- salah satu marketplace di Indonesia
- salah satu merk air mineral (tanpa spasi)
- salah satu kecamatan di jakarta pusat
- jumlah kursi plastik biru di toko
- kepanjangan T dihuruf T di ITC mangga dua
- kurir dengan tagline "Ketika semua jadi mudah"
- warna tulisan security di meja security lantai 5
Down
- menteri pendidikan 2020 (..... Makarim)
- garansi memory V-gen
- merk sepatu
- kota ( bukan negara) asal UGREEN
- Kota ( bukan negara )asal Akitio
- warna background logo Logitech Pelangi komputer
- nama salah satu mantan kurir Rajakom (kecil hitam)
- nama toko computer di samping semar
- merk monitor tv di lift
- salah satu merk laptop
20 Clues: merk sepatu • garansi memory V-gen • salah satu jenis kopi • salah satu merk laptop • merk kalkulator di toko • merk monitor tv di lift • kota ( bukan negara) asal UGREEN • Kota ( bukan negara )asal Akitio • jumlah kursi plastik biru di toko • salah satu marketplace di Indonesia • nama toko computer di samping semar • salah satu kecamatan di jakarta pusat • ...
Curricula Crossword 2022-03-18
Across
- what its called to surf the net
- service organization's controls
- pay this software to get your info back
- telecommunication message from phone
- a dishonest scheme; a fraud.
- telecommunication message from computer
- is able to subvert computer security.
- freedom from unauthorized intrusion
- Scammers want you to buys these for them
- a hacker's best friend
- hackers hide in me, and you love me
Down
- software intended to damage a computer
- share all your fav things with me
- double your safety using this
- following someone else into a building
- Deedee's toy and sidekick
- pink dress and an amazing hacker
- ethical principle of holding information
- the stronger the better
- I work security in Curriculaville
20 Clues: a hacker's best friend • the stronger the better • Deedee's toy and sidekick • a dishonest scheme; a fraud. • double your safety using this • what its called to surf the net • service organization's controls • pink dress and an amazing hacker • share all your fav things with me • I work security in Curriculaville • freedom from unauthorized intrusion • ...
Security Crossword Challenge 2015-02-18
15 Clues: Funny Money • 3rd President • 1st President • 7th President • 16th President • 18th President • Taking of items • Unusual Behavior • Opens many doors • Secures your money • Used to make change • Director of Security • 1st Ambassador to France • 1st Secretary of Treasury • Cash or valuables in transit
Security Crossword Puzzle 2022-04-20
Across
- Located at each desk and teller unit in the branch
- Employees will be asked to ______ the robber
- All employees are expected to follow ______ when in the vault
- _____ the bank is done at the beginning and end of each day
- Clean _____ policy
- Each branch has an _______ sign to signal it is safe to enter the branch
Down
- After a robbery, employees will be asked to reconstruct their last five _______
- _____ is one of the easiest ways to prevent a robbery
- If emailing sensitive information, _____ must be used
- The robbery packets also include a _______ checklist
- _____ code can be used by employees to activate the alarms
- Contact the ______ department to notify them of the robbery
- Remain _____ during a robbery
- Rocky Mountain Safe _______ Task Force will be involved after a robbery
- Hold-up _______
15 Clues: Hold-up _______ • Clean _____ policy • Remain _____ during a robbery • Employees will be asked to ______ the robber • Located at each desk and teller unit in the branch • The robbery packets also include a _______ checklist • _____ is one of the easiest ways to prevent a robbery • If emailing sensitive information, _____ must be used • ...
Social Security Card 2025-04-10
Across
- alien, A person from another country who can live or work in the U.S.
- of identity, A document that shows your name and who you are.
- To finish all parts of something.
- A document that shows who you are.
- Related or connected to the topic.
- Being a legal member of a country.
Down
- A form you fill out to ask for something officially.
- Done by choice, not required.
- To say something officially.
- A group of people with similar physical features or ancestry.
- out, To write all the needed information on a form.
- Allowed or qualified to do or receive something.
- Security card, An official card with a number used by the U.S. government to track your earnings and benefits.
- country, A country that is not your home country.
- To not do something or leave it out.
- guardian: A person with the legal right to care for another person.
16 Clues: To say something officially. • Done by choice, not required. • To finish all parts of something. • A document that shows who you are. • Related or connected to the topic. • Being a legal member of a country. • To not do something or leave it out. • Allowed or qualified to do or receive something. • country, A country that is not your home country. • ...
9Health Crossword Bullying 2024-09-15
Across
- Do not
- What should you not do back?
- When someone doesn't include you
- Bullying someone can ruin someone self
- Spreading lies about people
- Bullying Online
- Someone who stands up for others
- Bullying someone by their skin colour
- Bullying someone because of their mental and physical condition
Down
- Age group that gets bullied the most
- Using private information to get something from someone
- A place where most bullying takes place at
- Using Words
- People go here to feel better
- Someone who just watches people being bullied
- making others do stuff they don't want to do
- When your getting bullied tell a trusted
- Bullying that ruins someones reputation
- what is the person being bullied called
- What is the person bullying called
20 Clues: Do not • Using Words • Bullying Online • Spreading lies about people • What should you not do back? • People go here to feel better • When someone doesn't include you • Someone who stands up for others • What is the person bullying called • Age group that gets bullied the most • Bullying someone by their skin colour • Bullying someone can ruin someone self • ...
Security 2013-04-02
Across
- / a financial arrangement used to protect individuals or business against financial loss.
- / consists of actions taken to prevent crime and to protects the safety of people and property.
- / a safe deposit box that is usually kept in a large locked room.
- / the process of closely observing what is going on in an area.
Down
- / pays for losses due to crimes such as theft, arson, forgery, and embezzlement.
- / is knowing where all hotel keys are located at all times and knowing who has each key
6 Clues: / the process of closely observing what is going on in an area. • / pays for losses due to crimes such as theft, arson, forgery, and embezzlement. • / a safe deposit box that is usually kept in a large locked room. • / is knowing where all hotel keys are located at all times and knowing who has each key • ...
security 2014-02-27
6 Clues: voice pattern • look into the camera • place hand on scanner • no identity number needed • method to identify people • type of physiological characteristic
security 2021-08-18
security 2023-02-08
Cyber Security Homework 1 Year 8 2025-10-15
Across
- A self-replicating malware that spreads without user action.
- Crime involving stealing someone's personal information
- A type of malware that attaches itself to clean files.
Down
- Software designed to damage or disrupt systems
- A type of malware that pretends to be legitimate software
- A scam where attackers trick users into giving personal information
6 Clues: Software designed to damage or disrupt systems • A type of malware that attaches itself to clean files. • Crime involving stealing someone's personal information • A type of malware that pretends to be legitimate software • A self-replicating malware that spreads without user action. • A scam where attackers trick users into giving personal information
Unit 15-16 2023-03-13
17 Clues: lomp • toll • padi • sadam • trahv • rabav • kandik • tankla • kirurg • tegelik • karistus • vahekäik • turvalisus • pardapääse • aksessuaar • deklareerima • kellegi kallal norima
MIKOŁAJ'S CROSSWORD 2018-11-14
17 Clues: BŁĄD • DANE • BADANIA • KOMÓRKA • WTYCZKA • EKOLOGIA • ROBOTYKA • POŁĄCZYĆ • WYNALAZEK • GALAKTYKA • PRODUKOWAĆ • WPROWADZIĆ • ŚRODOWISKO • USTAWIENIA • ZAPROJEKTOWAĆ • BEZPIECZEŃSTWO • DATA WYSŁAĆ DANE
Total Defence Day 2023 - Digital Defence (P4-6) 2023-02-07
Across
- Cyber criminals will ask you for ______________ information like phone numbers, banking details and One-Time Passwords(OTPs).
- Scammers will ______________ your friends or Whatsapp support team to get your one-time code.
- Always practice good cyber ______________ to ensure your accounts are safe.
Down
- Malicious malware can cause the program to ______________.
- We can use ______________ as our passwords e.g. Saw Eagle At The Park.
5 Clues: Malicious malware can cause the program to ______________. • We can use ______________ as our passwords e.g. Saw Eagle At The Park. • Always practice good cyber ______________ to ensure your accounts are safe. • Scammers will ______________ your friends or Whatsapp support team to get your one-time code. • ...
Internet safety crossword 2023-03-06
Across
- It is important to _______ any incidences of cyber-bullying to an adult or someone you trust.
- It is also important to keep any __________ of cyber-bullying.
Down
- The internet is ________, which means that what you post online is difficult to remove.
- You should never post personal information on the internet, such as your ________ phone number.
- Other types of personal information include your _____ address.
5 Clues: It is also important to keep any __________ of cyber-bullying. • Other types of personal information include your _____ address. • The internet is ________, which means that what you post online is difficult to remove. • It is important to _______ any incidences of cyber-bullying to an adult or someone you trust. • ...
Module 8 Crossword 2024-03-02
Across
- is still a problem in many state and federal prisons, despite new prison construction and decline in use of imprisonment
- ________ security Inmates have more freedom to associate with each other
- The number of inmates a prison can effectively accommodate, based on management considerations
- The size of the correctional population an institution can effectively hold
Down
- Most people sentenced to federal prison were convicted of ______ law violations
- Most people sentenced to state prisons were convicted of ________ crimes
- The number of inmates a prison can handle, according to experts (yields highest capacities)
- The number of inmates a prison originally built to hold
- _______ security holds Death-row inmates all maximum-security prisoners
- _______ security Inmates generally housed in dormitory-like settings
10 Clues: The number of inmates a prison originally built to hold • _______ security Inmates generally housed in dormitory-like settings • _______ security holds Death-row inmates all maximum-security prisoners • Most people sentenced to state prisons were convicted of ________ crimes • ________ security Inmates have more freedom to associate with each other • ...
Intro to Cybersecurity Vocabulary 2025-10-14
Across
- set of security controls designed to protect payment account security such as credit or debit card transactions
- protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks
- crime committed over the internet
- short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
- set of policies and procedures meant to improve and guide an organization’s cybersecurity practices
- occur when hackers or malicious software gains unauthorized access to a system, examples include: hacker cracking passwords, breaking into a server or changing a user’s privileges on their system
Down
- set of best practice recommendations for information security management
- unique skills for a specific area
- attempt to steal, damage or destroy information on a device or computer system
- individual who participates in hacking
- abilities needed to communicate and work with others
- prevents a user from accessing a system
- act of skirting or breaking through security boundaries
13 Clues: unique skills for a specific area • crime committed over the internet • individual who participates in hacking • prevents a user from accessing a system • abilities needed to communicate and work with others • act of skirting or breaking through security boundaries • set of best practice recommendations for information security management • ...
Vocabulario de artículo 2021-02-25
17 Clues: far • city • port • town • ugly • clean • spaces • narrow • streets • cameras • security • pollution • dangerous • theme park • unemployment • entertainment • sports center
lentokenttäsanastoa 2021-11-19
17 Clues: loma • passi • hihna • lento • lähteä • saapua • portti • laukku • lentokone • matkustaa • terminaali • lentokenttä • matkalaukku • istumapaikka • turvallisuus • lähtöselvitys • nousta kulkuneuvoon
UNFPA SFPs 2021-05-10
7 Clues: Global Directory • Residential Security Measures • Security Communications Systems • Security Risk Management Measures • tool for reporting security incidents • UNDSS app for headcount and flash reports • Portal used by personnel with sec.responsibilities
cyber safety NIC PulcIanI 2016-05-25
Across
- talk and put photos that everyone can see
- communicate
- a persones detail
- steeling money from someone
- stolen information
- keep something to yourself
- method
- find something you want to know about
- female or male
Down
- information site
- a website containing writers opinion
- unwanted mail in your email account
- something mean cent to you
- one in a class
- someone who keeps you safe
- talk to someone
- internet
- to keep something safe
- illegally getting into someone's account
- something disgusting
20 Clues: method • internet • communicate • one in a class • female or male • talk to someone • information site • a persones detail • stolen information • something disgusting • to keep something safe • something mean cent to you • someone who keeps you safe • keep something to yourself • steeling money from someone • unwanted mail in your email account • a website containing writers opinion • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Cyber Safety-Irene Jose 2016-05-25
Across
- program that lets you find,see and hear material
- bad thing that can ruin your device
- you can chat on with family and friends
- method of sending short messages
- small hand-controlled device for pointing and clicking
- send information from one computer to another computer
- name that a user has chosen for you
- program,or set of instructions
- website for you so you can search
- search engine visual for parents mostly
Down
- upload information to the web
- starting point on the web
- add that automatically comes onto the screen
- you can send to others
- adviser that teaches you how to use technology
- security system to keep your things safe
- secrets code that unlocks something for you
- giant collection of networks of networks
- Engine,an Internet service that helps you find information on the website
- Tag,the nickname a user has chosen to be identified when playing Internet Games
20 Clues: you can send to others • starting point on the web • upload information to the web • program,or set of instructions • method of sending short messages • website for you so you can search • bad thing that can ruin your device • name that a user has chosen for you • you can chat on with family and friends • search engine visual for parents mostly • ...
Cyber safety-Alexander Sladic 2016-05-23
Across
- a dishonest scheme
- a way of publishing photos online
- protecting your personal information
- a person, known or unknown, that sends unexpected rude messages
- something to keep you entertained
- the environment of the Internet
- what you find on the Internet on a certain topic
- a collection of information on the Internet
- who you appear to be online
- unwanted messages
Down
- what you use to protect your electronic equipment and access
- something that can infect your device
- a way of sending and receiving mail electronically
- a way of getting something from the Internet
- the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organisation
- an online diary
- a device produced by Apple
- an online resource that helps you find information and connect with people
- attempts by scammers to trick you into giving out your personal information
- a way of communicating online
20 Clues: an online diary • unwanted messages • a dishonest scheme • a device produced by Apple • who you appear to be online • a way of communicating online • the environment of the Internet • a way of publishing photos online • something to keep you entertained • protecting your personal information • something that can infect your device • a collection of information on the Internet • ...
860 OSS Cyber Squad 2022-04-29
Across
- Shrek "Far Far Away"
- Kings of the Jungles
- Ruler of a country
- Explosion
- Famous Potato Chips
- THC
- The newest member
- Earth
- "The Great" Leader
- One Woman Show
- Kitchen Appliance
- Return to Sender via Biloxi
- Bart and Homer
- Empire State Building
- Best Buy Squad
- Liquor without "ch"
Down
- Movie Projector
- Porcupine
- Michigan Superior Ontario
- Mini Explosion
- Flowers and Roses
- Mound
- Aspen Colorado
- Personal Trainer
- Adam Eve
- Safety Concerns
- Boisterous
- Forged by the sea
28 Clues: THC • Mound • Earth • Adam Eve • Porcupine • Explosion • Boisterous • Mini Explosion • Aspen Colorado • One Woman Show • Bart and Homer • Best Buy Squad • Movie Projector • Safety Concerns • Personal Trainer • Flowers and Roses • The newest member • Kitchen Appliance • Forged by the sea • Ruler of a country • "The Great" Leader • Famous Potato Chips • Liquor without "ch" • Shrek "Far Far Away" • Kings of the Jungles • ...
Cyber Crossword | Easy 2 2023-07-06
Across
- The assurance that information is disclosed only to authorised entities.
- The disclosure of information to unauthorised persons, or a violation of the security policy of a system in which unauthorised intentional or unintentional disclosure, modification, destruction or loss of an object may have occurred.
- A feature or defect of a computer system that allows access to data by bypassing normal security measures.
- An event that is not part of normal operations that disrupts operational processes.
- A defect, fault or imperfection, especially one that is hidden or unknown.
- The methods used to manipulate people into carrying out specific actions, or divulging information.
- Self-replicating malware that uses a network to distribute copies of itself to other computer devices, often without user intervention.
- A virtual space in which new, untrusted or untested software or coding can be run safely without risking harm to the hosting computer.
- A deliberate act through cyberspace to manipulate, disrupt, deny, degrade or destroy computers or networks, or the information resident on them, with the effect of seriously compromising national security, stability or economic prosperity.
- The use of online advertising to spread malware. Involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.
Down
- A software program or group of software programs designed for end users.
- A type of attack where a message is made to look like it comes from a trusted source. For example, an email that looks like it comes from a legitimate business, but is actually trying to spread malware.
- Measurable physical characteristics used to identify or verify an individual.
- The principle of restricting an individual’s access to only the information they require to fulfil the duties of their role.
- A control system architecture comprising computers, networked data communications and graphical user interfaces for high-level process supervisory management. It also comprises other peripheral devices like programmable logic controllers and discrete proportional-integral-derivative controllers used to interface with process plant or machinery.
- A form of false advertisement which uses links that are designed to attract attention and entice users to follow that link and read, view or listen to the linked content, with a defining characteristic of being deceptive, typically sensationalised or misleading.
- The ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
- A collection of data or instructions that tell a computer how to work.
- Malicious software that makes data or systems unusable until the victim makes a payment.
- Setting up a fake website (or compromising a real one) in order to infect and exploit visiting users.
20 Clues: A collection of data or instructions that tell a computer how to work. • A software program or group of software programs designed for end users. • The assurance that information is disclosed only to authorised entities. • A defect, fault or imperfection, especially one that is hidden or unknown. • ...
CYBER AND DIGITAL LITERACY 2024-05-02
Across
- systematic investigation into and study of materials and sources
- action or omission that constitutes an offense that may be prosecuted
- any program or utility that helps programmers or users
- the fact of being who or what a person or thing is
- having special and usually practical knowledge
- he act of posting or reposting content on your social media
- a file or code, typically delivered over a network
- the imparting or exchanging of information or news
- the condition of being safe from undergoing
- he protection of computer systems and information
- complex configuration composed of hardware
- system that connects two or more computing devices
- the process by which topic ideas that appeal
- personal information
- spreads between computers and causes damage
- a computer or system that provides resources, data, services, or programs
- a set of instructions, data or programs used to operate computers
- organized or classified data, which has some meaningful values for the receiver
- the recording, reproducing, or broadcasting of moving visual images
- action of working with someone to produce or create something
- control the functioning of a system
Down
- available on or performed using the internet or other computer network
- a microcomputer designed for use by one person at a time
- acquisition of knowledge or skills through experience
- the innovative use of digital tools and technologies during teaching and learning
- anything you share on social media
- to make additions, deletions, or other changes
- a media type displayed as visual information
- knowledge and ability to use computers
- create, share, and/or exchange information and ideas in virtual communities
- information that can be interpreted and used by computers
- To store data on and retrieve data from a disk or other peripheral device
- the act of compromising digital devices and networks
- the protection of computer systems
- any electronic or online account
- a secret word or expression used by authorized persons
- he main means of mass communication
- creating globalized accounts on each relevant platform
- to deliver messages across computer networks
- the application of scientific knowledge to the practical aims of human life
- relating to or characteristic of the culture of computers
- a global network of billions of computers and other electronic devices
- a digitally replicated version of something real
- a detailed examination of anything complex
- a person who utilizes a computer or network service
- potential negative action
- electronic technology that generates
- device that accepts information
- online journal or information website
- relating to the present or recent times
50 Clues: personal information • potential negative action • device that accepts information • any electronic or online account • anything you share on social media • the protection of computer systems • he main means of mass communication • control the functioning of a system • electronic technology that generates • online journal or information website • ...
CYBER AND DIGITAL LITERACY 2024-04-30
Across
- is an expanded conceptualization of literacy that includes the ability to access and analyze media
- These are schemes that deceive the users in various ways in an attempt totake advantage of them
- is the ability to access, manage, understand, integrate, communicate, evaluate and create information safely
- is free for student, teacher, and personal use
- to plan, direct, or plot the path or position of (a ship, an aircraft, etc)
- the ability of students to use digital technology, communication tools and/or networks appropriately to solve information problems to function in an information society
- a portable computer that is small enough to use on one's lap
- a free photo and video sharing app
- the action of working with someone to produce or create something.
- a group of data that collectively carries a logical meaning.
- It is the use of electronic means, such as instant messaging, social media, e-mail and other forms of online communication with the intent to abuse, intimidate, oroverpower an individual or group
- is the intellectually disciplined process of actively and skillfully conceptualizing, applying, analyzing
- a style of shoe with a very thick sole that is equally or almost equally thick at the front and back, so the foot is almost flat inside
- refers to reading and writing abilities
- a string of characters used to verify the identity of a user during the authentication process
- is the ability to discover, evaluate, and use information and technology effectively and ethically.
- defined as the capacity to use computer technology successfully
- the ability to read, write and create visual images.
- show that technology and its use can improve intructional practices
- available on or performed using the internet or other computer network
- a device or implement, especially one held in the hand, used to carry out a particular function.
- ability to access, manage, understand, integrate, communicate, evaluate and create information
- learning facilitated by technology that gives students some element of control over time, place, path and/or pace.
- ability and capacity acquired through deliberate, systematic, and sustained effort
- a representation of a person's real self, online.
- Various websites on the Internet contain material that maydeem offensive, distasteful or explicit
- a theory by Gregory Ulmer that describes the skills necessary to exploit the full communicative potential of a new electronic media
- It is a common type of scam, of which the scammers disguise as a trustworthysource in an attempt to obtain private information,
- a piece of writing, image, or other item of content published online, typically on a blog or on social media.
Down
- a short burst of inconsequential information and chirps from birds
- Just like physical documents are so arranged that they can be easily findable, digital file management is the cornerstone of order in a virtual environment.
- means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- Mastery of web-surfing is like finding treasures in the enormous ocean
- is defined as the knowledge and ability to use computers and related technology efficiently
- relating to, or utilizing devices constructed or working by the methods or principles of electronics
- A term coined by Howard Rheingold to describe the digital literacy skills of managing the technology we use and synthesizing the information we find online.
- a device that uses either a system of wires along which electrical signals are sent or a system of radio signals
- the action of taking part in something.
- the state of being comfortable, healthy, or happy
- facts provided or learned about something or someone.
- the application of scientific knowledge for practical purposes,
- a social networking site that makes it easy for you to connect and share with family and friends online.
- an award-winning education technology platform that makes it easy to augment images, videos, and virtual tours with additional information and links.
- Communication defines the traditional classrooms
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software.
- It is a malicious software (particularly spyware) disguised to collect and transmitprivate information,
- It is the act of engaging an underage minor into appropriate sexualrelationships through the Internet
- It is the use of the Internet or other electronic means to stalk or harass anindividual
- the use and application of technology and digital tools in international development
- upload a video of (someone or something)
- absolutely necessary or important; essential.
- it incorporates a lot more.
52 Clues: it incorporates a lot more. • a free photo and video sharing app • the action of taking part in something. • refers to reading and writing abilities • upload a video of (someone or something) • absolutely necessary or important; essential. • is free for student, teacher, and personal use • Communication defines the traditional classrooms • ...
CyberSecurity Awareness - Cyber Knowledge 2024-09-24
Across
- is a cybersecurity threat in which attackers use QR codes to redirect victims to malicious websites or prompt them to download harmful content.
- email that is not wanted, email that is sent to large numbers of people and that consists mostly of advertising
- a weakness that can be accidentally triggered or intentionally exploited
- a software update inserted (or patched) into the code of an executable program that fixes bugs, installs new drivers
- computer software that is provided usually for free but contains advertisements
- a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data.
- a program that is designed to harm a computer by deleting data,
- a string of words and characters that you type in to authenticate yourself
- preventive cybersecurity action
- a scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicitly
- A tailgating attack is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
- a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action
Down
- the act of obtaining or attempting to obtain sensitive information by manipulating an individual into revealing secure information
- measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
- having or showing realization, perception, or knowledge
- Employs deceptive text messages (SMS) to lure victims into sharing personal information or clicking malicious links.
- software designed to interfere with a computer's normal functioning
- computer software that secretly records information about the way you use your computer
- a potential circumstance, entity or event capable of exploiting a vulnerability and causing harm
- a secret series of numbers or letters that allows you to use a computer system
- Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect mean
21 Clues: preventive cybersecurity action • having or showing realization, perception, or knowledge • a program that is designed to harm a computer by deleting data, • software designed to interfere with a computer's normal functioning • a weakness that can be accidentally triggered or intentionally exploited • ...
Cyber Physical Systems-2 2025-03-20
Across
- Using data to forecast and prevent equipment failures.
- Self-driving cars and intelligent transportation systems.
- A predictable system behavior under given conditions.
- The delay between input and response in a system.
- An intelligent electricity network with automated controls.
- The use of technology to control industrial processes.
- Ensuring processes operate in a coordinated manner.
- The ability to continue operation despite component failures.
Down
- Smart healthcare devices with embedded intelligence.
- The creation of mathematical representations of systems.
- The ability of a system to function under expected conditions.
- The process of improving system performance.
- The capacity of a system to handle growth efficiently.
- Urban areas that integrate technology for improved efficiency.
- Monitoring and optimizing energy consumption.
- Farming with IoT and AI for better productivity.
- The production of goods using machines and automation.
- The management of materials and goods from production to delivery.
- Duplication of critical components to increase reliability.
- The capacity of a system to recover from disruptions.
20 Clues: The process of improving system performance. • Monitoring and optimizing energy consumption. • Farming with IoT and AI for better productivity. • The delay between input and response in a system. • Ensuring processes operate in a coordinated manner. • Smart healthcare devices with embedded intelligence. • A predictable system behavior under given conditions. • ...
Cyber ethics and networking 2025-06-05
Across
- A secret word to access systems
- Always log out of ____ after use
- Act of pretending to be someone else online
- A rule that controls data transmission
- Software designed to protect against viruses
- Repeated online harassment
- Someone who uses tech to harm others
- Common wireless security protocol
- A global system of interconnected networks
Down
- Helps to convert domain names to IP address
- Never share your ____ with strangers
- Unsolicited email or messages
- Think before you ____ online
- Connecting to someone's Wi-Fi without permission
- Connects computers in a small area
- Protects private data on a network
- address The unique address of a device on a network
- Online behaviour guidelines
- Avoid clicking these in suspicious emails
- Device that forwards data pockets
20 Clues: Repeated online harassment • Online behaviour guidelines • Think before you ____ online • Unsolicited email or messages • A secret word to access systems • Always log out of ____ after use • Common wireless security protocol • Device that forwards data pockets • Connects computers in a small area • Protects private data on a network • Never share your ____ with strangers • ...
tesdtfuf 2023-01-04
The Secret Life of Locks 2025-05-19
Across
- To open a lock
- Used for digital or keypad locks
- Simple mechanism to hold doors closed
- Type of lock with numbered dial
- Device used to secure things
- Opens multiple locks
Down
- Purpose of a lock
- To open a lock without a key
- Strong lock on doors
- Additional layer of door security
- Heavy-duty part of a lock
- Portable type of lock
- Used to open a lock
- Box that uses a lock for valuables
14 Clues: To open a lock • Purpose of a lock • Used to open a lock • Strong lock on doors • Opens multiple locks • Portable type of lock • Heavy-duty part of a lock • To open a lock without a key • Device used to secure things • Type of lock with numbered dial • Used for digital or keypad locks • Additional layer of door security • Box that uses a lock for valuables • ...
U11 - Mod 22 Key Terms 2024-11-25
Across
- (6,6) policy, sets out how to remotely connect to an organization’s internal network and explains what information is remotely accessible.
- (8) policy, this document addresses the constraints and behaviors of individuals within an organization and often specifies how data can be accessed, and what data is accessible by whom.
- (10,3) policy, highlights a set of rules that determine access to and use of network resources.
- (5) resources security, this refers to the security procedures in place that relate to employees joining, moving within, and leaving an organization.
- (8,8) policy, provides guidance on how to report and respond to security-related incidents within an organization.
- (8) policy, defines minimum password requirements.
- (10) policy, enforces the rules for composing credentials.
Down
- (4,10) this is the first step in the risk management process, which determines the quantitative and qualitative value of risk related to a specific situation or threat.
- (14) and authentication policy, specifies who should be permitted access to network resources and what verification procedures are in place to facilitate this.
- (11,8) incident management, this describes an organization’s approach to the anticipation of and response to information security breaches.
- (4) policy, sets out measurable rules for processing data within an organization, such as specifying where data is stored, how data is classified, and how data is handled and disposed of.
- (5,10) this is an inventory of and classification scheme for information assets within an organization.
- (14) policy, provides guidance for how work should be carried out in an organization.
- (7) maintenance policy, outlines procedures for updating an organization’s specified operating systems and end-user applications.
14 Clues: (8) policy, defines minimum password requirements. • (10) policy, enforces the rules for composing credentials. • (14) policy, provides guidance for how work should be carried out in an organization. • (10,3) policy, highlights a set of rules that determine access to and use of network resources. • ...
Crimes 2016-09-19
8 Clues: Hurting someone • Lying under oath • Starting a harmful fire • Pretending to be someone else • Crime A crime that is committed online • Forcefully taking something from someone • Threatening or physically harming someone • Crime A crime done in dislike of a certain race, religion, orientation
bullying 2023-11-28
8 Clues: games • An saying rude things • An when you hurt someone. • An hurting with your feet. • An you listen to people with ______. • bullying An hurting someones feelings • An talking when someone else is talking. • bullying An when you bully someone on ticktock,you tube
Hacker 2013-02-05
Across
- The art and science of cracking the phone network
- Products announced far in advance of any release.
- A malicious, security-breaking program that is disguised as something benign
Down
- Someone who accesses a computer system by circumventing its security system
- Code with a complex and tangled control structure
- A person whoknows how a complex piece of software or hardware works
- Individual hired to break into places in order to test their security
- A hole deliberately left in place by designers or maintainers
- One who breaks security on a system
9 Clues: One who breaks security on a system • Code with a complex and tangled control structure • The art and science of cracking the phone network • Products announced far in advance of any release. • A hole deliberately left in place by designers or maintainers • A person whoknows how a complex piece of software or hardware works • ...
chapter 4 vocab 2017-02-21
20 Clues: taxi • gate • pilot • flight • to take • luggage • arrival • monotor • customs • passport • security • to board • to leave • itnerary • suitcase • departure • to travel • identification • to pass through • round tripticket
3a 2018-02-28
21 Clues: utas • ülés • érzék • benti • üzlet • tucat • rémálom • kezelés • békésen • masszázs • fogorvos • ingyenes • nagykövet • városnézés • paradicsom • létesítmény • szolgáltatás • legalább (2,5) • golfpálya (4,6) • beszáll (repülőbe) • biztonság(i ellenőrzés)
EnglishMaster? 2021-03-11
21 Clues: Heli • Power • Mikro • Klima • sonnig • Flamme • Emotion • "Wache" • klopfen • Staffel • neutral • programm • Lauffeuer • gegenüber • Atmosphäre • Lagerfeuer • Langes Auto • "schneiden" • Feuerwehrmann • "auch gepostet" • Very importen person
cyber bullying 2019-07-11
7 Clues: its not nice • eminiem song • spooky mask bois • part of a yanderes job • its rain clouds as an emotion • like someone poking you repeatedly • whats the robot thing in doctor who called?
Teka teki silang keamanan jaringan 2025-11-28
Across
- Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
- SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
- Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
- FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
- (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
- Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
- OF SERVICE (DOS)
- ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
- Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
- Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
- OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
Down
- FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
- Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
- SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
- Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
- SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
- BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
- SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
- Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
- OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
- OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
22 Clues: OF SERVICE (DOS) • Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi. • SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware. • Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang. • Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal. • ...
FOCUS ON IELTS/ UNIT 2 2014-02-10
wilko 2015-02-17
Across
- how old Tom is on his big birthday
- toms pastime at break
- what Tom carries on shop floor
- security device used in store
- toms car
- toms old force
- toms boss
- toms version of 50 shades
- toms wife
- toms favourite wind up merchant
- picture of suspect
Down
- date of toms birthday
- what Tom does to shoplifters
- what's in toms black folders
- toms old car
- toms former job
- what Tom calls a shoplifters
- guard toms job
- recorded evidence
- toms Mon morning job
- toms home town
- month of toms birthday
- what Tom does in the warehouse
- toms old boss
- toms son
- toms daughter
- toms favourite word
27 Clues: toms car • toms son • toms boss • toms wife • toms old car • toms old boss • toms daughter • guard toms job • toms home town • toms old force • toms former job • recorded evidence • picture of suspect • toms favourite word • toms Mon morning job • date of toms birthday • toms pastime at break • month of toms birthday • toms version of 50 shades • what Tom does to shoplifters • what's in toms black folders • ...
Tema 2 2021-10-07
Across
- displaced
- worldpopulation
- totackle,toboard
- countriesoftheworld
- citizenship/thecitizens
- totry,attempt
- towork,haveajob
- flow
- (in)security;(lackof)security
- approach,pointofview,focus
- famoso,famous
- movement,motion
- toattain/tobeableto
- immigrants-lapersonaquesaledesulugardeorigenparallegaraundestinodiferente
- laadministracion,management
- willexist
- restart
- analyze,examine
- foreigner,alien
- worldwide
- AfricanStudiesGroup
- immigrationaccionyefectodeinmigar
Down
- immigrantswithinone'sowncountry
- tolink,toconnect
- federation
- toemigrate(leaveacountry)
- ignorance,lackofawareness
- population
- fromthesouth
- toexchange,totrade
- wewillhave(futuretenseoftener)
- legal
- knowledge,understanding
- Ibelievethat
- ignition,on
- totrackdown
- country,nation
- visa(traveldocument)
- tobrake,stop
- development,growth,progress
- reason
- totravel,journey
- continent,mainland
- terrorist(male)
- workingday; day'sjourney
- toreach,achieve
- toimmigrate(enteracountry)
- inside,in
- phenomenon
49 Clues: flow • legal • reason • restart • displaced • willexist • inside,in • worldwide • federation • population • phenomenon • ignition,on • totrackdown • fromthesouth • Ibelievethat • tobrake,stop • totry,attempt • famoso,famous • country,nation • worldpopulation • towork,haveajob • movement,motion • terrorist(male) • toreach,achieve • analyze,examine • foreigner,alien • tolink,toconnect • totackle,toboard • totravel,journey • ...
juuadvsuu8vu8jju8 news week 6 jndfsjdijd 2025-01-08
Across
- Water gets infested with oil after boat incident
- Wisconsion School Shooting
- what killed a Russian general
- on alert for snow and ice
- Canadian prime minister announces resignation
- D.C. boosts security after attack, how many did they add
- New launches new offensive in Russia
- Deadly winter storm sweeps across the country as millions face Arctic outbreak
- Attacked people on new years
- what happened on Dec17, 2024
- Congrestion takes effect in NYC
Down
- Got attacked by Ukraine
- Charging people for driving
- how many flights have been canceled or delayed
- Suspect traveled to new orleans
- Faced security warnings years before attack
- E-Bike incident
- Wrestled to the ground by cops
- Who died [39th president]
- On strike at mountain resort
20 Clues: E-Bike incident • Got attacked by Ukraine • on alert for snow and ice • Who died [39th president] • Wisconsion School Shooting • Charging people for driving • On strike at mountain resort • Attacked people on new years • what happened on Dec17, 2024 • what killed a Russian general • Wrestled to the ground by cops • Suspect traveled to new orleans • Congrestion takes effect in NYC • ...
CPNI 2025-04-29
Across
- Unauthorized access or disclosure of CPNI.
- Security measure for account access.
- Ability to view or use data.
- Right to control personal information.
- Customer declines to share CPNI externally.
- Information collected about customers.
- Employee education on CPNI rules.
- Sharing information with others.
- Regulates telecom privacy, including CPNI rules.
- Confirming identity before disclosing CPNI.
- Action taken for non-compliance.
- Breach of CPNI rules or policies.
Down
- Measures to safeguard customer data.
- Customer permission to use or share CPNI.
- Protections for preventing data leaks.
- Rules for handling CPNI properly.
- Customer agrees to share CPNI with others.
- Customer service profile or record.
- Information kept private and protected.
- Customer data collected by telecoms about service usage.
20 Clues: Ability to view or use data. • Sharing information with others. • Action taken for non-compliance. • Rules for handling CPNI properly. • Employee education on CPNI rules. • Breach of CPNI rules or policies. • Customer service profile or record. • Measures to safeguard customer data. • Security measure for account access. • Protections for preventing data leaks. • ...
ai 2025-01-22
Across
- : Unfair favoritism in AI decisions.
- : Monitoring for security or control.
- : The natural world affected by AI.
- : Information used by AI.
- : The ability to act independently.
- : Something made by humans, not natural.
- : The ability of a machine to think like a human.
- : Introducing something new.
- : The science of designing robots.
- : Relying too much on something.
Down
- : Studying data to draw conclusions.
- : The process of acquiring knowledge or skills.
- : Identifying something or someone.
- : Keeping personal information safe.
- : A set of rules for solving a problem (AI-related).
- : Using imagination to create something new.
- : Completing tasks with minimal waste.
- : Protecting against threats or harm.
- : Using machines to perform tasks automatically.
- : The application of scientific knowledge.
20 Clues: : Information used by AI. • : Introducing something new. • : Relying too much on something. • : The science of designing robots. • : Identifying something or someone. • : The natural world affected by AI. • : The ability to act independently. • : Unfair favoritism in AI decisions. • : Studying data to draw conclusions. • : Keeping personal information safe. • ...
Genius Grid - III 2025-02-19
Across
- Component of an air handling unit (AHU) responsible for filtering airborne particles
- The front line of defense in information security
- Honeywell deploy _____sensors for real-time data collection in smart cities.
- The Iconic site for our HBS, In this Arabian city, I'm named after a flower yet stand taller than all. What am I?
- Puts out fire with chemicals
- Danger or risk
- Recent acqusition portfolio of honeywell for security GBE
Down
- In the context of BMS, EMS stands for ______ management systems
- Device used to store current and also It acts as filter
- Freedom from danger
- VDGS Stands for Visual _____ Guidance System
- ______city in the USA has partnered with Honeywell to implement smart city technologies aimed at improving public safety and energy efficiency? This city gave birth to wotld's most famous soda drink.
- _________ Infrared Sensor (PIR)
- Heat, light, and flames produced by burning
- BEATS portfolio includes Niagara, Alerton P&S and _______ brands
- a digital security measure
16 Clues: Danger or risk • Freedom from danger • a digital security measure • Puts out fire with chemicals • _________ Infrared Sensor (PIR) • Heat, light, and flames produced by burning • VDGS Stands for Visual _____ Guidance System • The front line of defense in information security • Device used to store current and also It acts as filter • ...
Key terms for Taxes 2024-12-02
Across
- Deduction A flat amount subtracted from taxable income.
- Pay Compensation for hours worked over 40 in a week, calculated at 1.5 times the regular hourly rate.
- Gains Profit earned from selling investment assets.
- Contractor An individual working independently without employee benefits.
- Benefits Employment benefits required by law, such as Social Security and Medicare.
- Benefits Employer-provided perks like health insurance or retirement plans.
- Donations Tax-deductible contributions made to qualified nonprofits.
Down
- Security A federal program providing income for retirees and disabled individuals.
- Deductions Expenses that reduce taxable income when listed individually.
- A health insurance program for those aged 65 or older.
- Tax funding Social Security and Medicare programs.
- Gross Income (AGI) Income after allowable deductions, used to calculate taxes.
- Wage The lowest hourly wage allowed by law.
- Tax Taxes withheld from an employee’s paycheck for FICA and income tax.
- Brackets Income ranges taxed at progressively higher rates.
- Loss: Deductible property damage from federally declared disasters.
16 Clues: Wage The lowest hourly wage allowed by law. • Tax funding Social Security and Medicare programs. • Gains Profit earned from selling investment assets. • A health insurance program for those aged 65 or older. • Deduction A flat amount subtracted from taxable income. • Brackets Income ranges taxed at progressively higher rates. • ...
Gefahren im Internet 2022-04-25
4 Clues: bist du ein...? • wo finde meistens cyber-mobbing statt? • was bedeutet hate massages auf deutsch? • wie nennt man beleidigungen auf digitaler ebene
boilermaking mehdi 2023-04-03
8 Clues: is fer + carbon • security for head • security for foot • security for hands • with this we can screw • we can cut metal sheet • with this we can hit nails • with this we can stick 2 metal parts
technology 2023-11-06
Across
- used to see better
- used to type better
- is in the mediaverse
- used to make device work
- used to plug in things
- are used to not have sound loud
- you use it alot in school
- energy used for energy from sun
Down
- used to talk to people online
- is used for all thing to work
- there are thousands of them in technology
- used to keep electronic alive
- used to watch and play things on device
- type of car but different and new
- used to help instead of the computer mouse
15 Clues: used to see better • used to type better • is in the mediaverse • used to plug in things • used to make device work • you use it alot in school • used to talk to people online • is used for all thing to work • used to keep electronic alive • are used to not have sound loud • energy used for energy from sun • type of car but different and new • used to watch and play things on device • ...
Cyber Awareness Puzzle 2022-10-13
Across
- When raw data is put into context and has meaning, the data transforms into ...
- A type of malware that records every single press of the keyboard that you make.
- A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known.
- The IT ... 2000 is the law used to prosecute cybercrime in India
- link designed to steal personal information.
- Settings on folders or files that control who is allowed to access them.
Down
- I am not a robot.
- ... authentication requires an additional method of checking that it is really you trying to interface with another system (two words).
- Gaining unauthorised access to or control of a computer system.
- Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
- Malicious code intended to monitor your activity without your permission.
- An email that contains a message with a
- A malicious code typically disguised as a legitimate program.
13 Clues: I am not a robot. • An email that contains a message with a • link designed to steal personal information. • A malicious code typically disguised as a legitimate program. • Gaining unauthorised access to or control of a computer system. • The IT ... 2000 is the law used to prosecute cybercrime in India • ...
Bully 2021-06-25
Across
- a person that does something bad over and over
- a feeling that is tied to the colour blue
- a feeling that also is tied to the colour red
- a bad thing people do
- a mind thing
Down
- a short term for technology
- not good
- when they punch or push you
- a feeling that also is tied to the colour blue
- worry
- a feeling that is tied to the colour red
11 Clues: worry • not good • a mind thing • a bad thing people do • a short term for technology • when they punch or push you • a feeling that is tied to the colour red • a feeling that is tied to the colour blue • a feeling that also is tied to the colour red • a person that does something bad over and over • a feeling that also is tied to the colour blue
ΚΟΙΝΩΝΙΚΑ ΔΙΚΤΥΑ 2023-04-26
Across
- Πιο είναι το πιο διαδεδομένο μέσο κοινωνικής δικτύωσης.
- Τείχος προστασίας.
- Κακόβουλο πρόγραμμα.
- Όταν κάποιος υποδύεται μία αξιόπιστη οντότητα ώστε να αποστήση τα προσωπικά του δεδομένα.
- Περιέχει προσωπικές μας πληροφορίες.
- ανεπιθύμητα μηνύματα.
Down
- Κακόβουλη χρήστες που στοχοποιούν και παρενοχλούν άλλους.(2 λέξεις)
- Συμπεριφορά που χαρακτηρίζεται απο εξάρτηση σε μια συγκεκριμένη δραστηριότητα.
- Δυνατότητα κοινωνικής συναναστροφής με άλλα άτομα.
- Βλαβερό πρόγραμμα που ανπαράγεται δημιούργοντας αντίγραφα του εαυτού του.
- Λογισμικό προστασίας από ιούς.
11 Clues: Τείχος προστασίας. • Κακόβουλο πρόγραμμα. • ανεπιθύμητα μηνύματα. • Λογισμικό προστασίας από ιούς. • Περιέχει προσωπικές μας πληροφορίες. • Δυνατότητα κοινωνικής συναναστροφής με άλλα άτομα. • Πιο είναι το πιο διαδεδομένο μέσο κοινωνικής δικτύωσης. • Κακόβουλη χρήστες που στοχοποιούν και παρενοχλούν άλλους.(2 λέξεις) • ...
Cyber Extortion crossword 2024-04-08
Across
- ______ extortion is extortion of money online.
- Demand for payment in exchange for stolen data.
- Abbreviation of Distribution Denial of Service.
- _________ of service.
- Distribution Denial of Service DDoS affects.
- Opposite of encryption.
Down
- A threat to release sexually images, videos unless a ransom is paid.
- A method used by extortionists to convey demands.
- A victim maybe _____ out of basic computer functions.
- Extortionists use this to encrypting files or lock systems.
- You should never ______ ransom.
11 Clues: _________ of service. • Opposite of encryption. • You should never ______ ransom. • Distribution Denial of Service DDoS affects. • ______ extortion is extortion of money online. • Demand for payment in exchange for stolen data. • Abbreviation of Distribution Denial of Service. • A method used by extortionists to convey demands. • ...
REDEMPTION CW 2023-07-27
Across
- Evicted against vincent
- evicted first
- Evicted in the first 3-1 vote
- evicted in the triple eviction
- was the first COHOH of the season
- evicted in the triple eviction
Down
- An HOH competition Jenn won!
- Evicted in a triple eviction
- the goal of the entire season! You want to be this!
- the name of the host of the Longterm
- evicted in a triple eviction
11 Clues: evicted first • Evicted against vincent • An HOH competition Jenn won! • Evicted in a triple eviction • evicted in a triple eviction • Evicted in the first 3-1 vote • evicted in the triple eviction • evicted in the triple eviction • was the first COHOH of the season • the name of the host of the Longterm • the goal of the entire season! You want to be this!
The Bois Minecraft server 2023-05-01
Across
- the max amount of data
- online security safety
- A group of people all connected to one what?
- studies properties of spaces
- LAN
- big boss of internet
Down
- security regulations
- a person or organization using the services of a lawyer or other professional person or company.
- one group server access
- a very safe way to stop viruses
- your online adress
- Thing you put USB into
- Interconnected devices
13 Clues: LAN • your online adress • security regulations • big boss of internet • the max amount of data • online security safety • Thing you put USB into • Interconnected devices • one group server access • studies properties of spaces • a very safe way to stop viruses • A group of people all connected to one what? • ...
Mon 20 March DOGS 2023-03-20
11 Clues: See Security • Dog with bad PR • Will eat anything • Mills needed these • Good pullers in packs • Teutonic sheep keepers • Creative groomers dream • Roman fine boned runner • Long everywhere apart from legs • The best for cheaper vets bills • Security called they want their dog back
Vocabulario #6 (es2) - write translations! 2022-10-31
16 Clues: – trip • – seat • – pilot • – aisle • – window • – flight • – counter • - delayed • – luggage • – security • – backpack • – Passport • – passenger • – departure • – Cancelled • – to travel
CH2 Vocab 3H 2021-11-19
19 Clues: kapen • busje • rijkdom • voertuig • aankunnen • rechtzaak • ontrafelen • verbeteren • krantenkop • buitenwijk • beveiliging • ontwikkelen • terugkrijgen • volgen, opsporen • gejaagd, hectisch • misdeeld, verstoken • custody in hechtenis • investering, belegging • verdeling, distributie
Focus unit 1 2023-11-14
19 Clues: - אי • - דעה • - במשך • - פריט • - בטוח • - מתנה • - עגלה • - מטוס • - סיבה • - לדחוף • - דרכון • - עיתון • - לא רגיל • - בית מלון • - שדי תעופה • sale - במבצע • - להעמיד פנים • - ריצפה, קומה • guard - מאבטח
Cyber Security Awareness Month Week 3 2021-10-22
Across
- Setup a ______ network with strong password for smart devices to limit the damage of a cyberattack on your home network.
- ________is a network security device or software, that monitors and block specific traffic based on a defined set of security rules.
- _______ engineering is a psychological manipulation technique that tricks users into giving away sensitive information
Down
- Think before you click on _______ or links in any emails
- ___ is an authentication method that requires the user to provide two or more verification factors to gain access.
- Using a trusted ________ manager can help keep your passwords organized and secured.
6 Clues: Think before you click on _______ or links in any emails • Using a trusted ________ manager can help keep your passwords organized and secured. • ___ is an authentication method that requires the user to provide two or more verification factors to gain access. • ...
ONLINE SAFETY CROSSWORD 2013-01-31
Across
- If you find something inappropriate, ____ it.
- Another word for the internet
- Keep all of your information ______
- Computers are often open to _____
- If anything happens online, tell an ______
- Do not send on _________ to your friends
Down
- Only let your ______ see your personal information
- Rarely any free offers that come up online are actually ____
- The age you must be to go on YouTube
- Many online offers are _____
10 Clues: Many online offers are _____ • Another word for the internet • Computers are often open to _____ • Keep all of your information ______ • The age you must be to go on YouTube • Do not send on _________ to your friends • If anything happens online, tell an ______ • If you find something inappropriate, ____ it. • Only let your ______ see your personal information • ...
Futuristic cities 2024-06-28
Across
- - Bright, glowing lights often used in signs.
- - To move instantly from one place to another.
- - A place where spacecraft are launched and landed.
- - A machine that can perform tasks automatically.
- - A 3D image created with lasers.
Down
- - A very tall building.
- - A vehicle that floats above the ground.
- - A robot that looks like a human.
- - Relating to computers or technology.
- - An unmanned aerial vehicle.
10 Clues: - A very tall building. • - An unmanned aerial vehicle. • - A 3D image created with lasers. • - A robot that looks like a human. • - Relating to computers or technology. • - A vehicle that floats above the ground. • - Bright, glowing lights often used in signs. • - To move instantly from one place to another. • - A machine that can perform tasks automatically. • ...
The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons 2023-05-04
Across
- what car manufacturer made the first modern driverless car
- data should not be kept longer than
- who is exempt from the data protection act
- all personal data should be kept
- the owner of the data
Down
- the DPA has 8
- police, government and taxers all all ______ from the DPA
- a form of cyber-bullying
- data must be routinely for maximum protection
- data should be used
10 Clues: the DPA has 8 • data should be used • the owner of the data • a form of cyber-bullying • all personal data should be kept • data should not be kept longer than • who is exempt from the data protection act • data must be routinely for maximum protection • police, government and taxers all all ______ from the DPA • what car manufacturer made the first modern driverless car
Code B 2023-12-07
Across
- Programming language for web development
- Process of identifying and fixing errors in code
- Function that calls itself
- Repeating a process or set of instructions
- Markup language for creating web pages
Down
- Application Programming Interface for software communication
- Prefix related to computers and digital technology
- Graphical User Interface for user interaction
- Symbol indicating a specific operation in code
- Set of rules governing the structure of code
10 Clues: Function that calls itself • Markup language for creating web pages • Programming language for web development • Repeating a process or set of instructions • Set of rules governing the structure of code • Graphical User Interface for user interaction • Symbol indicating a specific operation in code • Process of identifying and fixing errors in code • ...
Circle of Security 2021-03-12
Across
- When possible follow your child's __________.
- It is never too ______ to be a good parent.
- Whenever necessary, take _____________.
- _____________ Firmness and Affection.
- Change child by changing your ___________.
- Babies naturally seek ____________.
- Name callers are ____________.
- Children need us to be________.
Down
- Knowing we are loved gives us ___________.
- Children need us to be ______________.
- Security teaches a baby to feel __________.
- Know you can NOT be _________,and that is ok.
- Without knowledge children can feel________.
- Babysitters should be over age _____.
14 Clues: Name callers are ____________. • Children need us to be________. • Babies naturally seek ____________. • _____________ Firmness and Affection. • Babysitters should be over age _____. • Children need us to be ______________. • Whenever necessary, take _____________. • Knowing we are loved gives us ___________. • Change child by changing your ___________. • ...
Unit 2 Vocabulary: The Human Factor 2023-10-13
Across
- Deceptive schemes or rumors created with the intent to mislead or trick people. They are typically spread through various channels, including social media, email, or other forms of communication.
- A formal set of rules, guidelines, or principles established by an organization to govern its operations and decision-making. Often outline security procedures and best practices.
- A form of cyberattack where attackers impersonate legitimate organizations or individuals to trick recipients into revealing sensitive information like login credentials, personal details, or financial data. It's often done through deceptive emails, websites, or messages.
- A type of phishing that occurs through text messages or SMS. Attackers send fraudulent messages that may contain malicious links or ask for sensitive information.
- A tactic where an attacker manipulates individuals into approaching them for information or assistance. The attacker, in this case, positions themselves as a helpful resource to extract information or gain access.
- The unauthorized access, exploration, or manipulation of computer systems, networks, or data. It can have both positive and negative connotations.
- Occurs when an unauthorized person gains physical access to a restricted area or building by following an authorized person without their knowledge or consent.
- To reduce or lessen the severity or impact of a problem or risk. It involves taking steps to minimize the potential harm from security threats or vulnerabilities.
Down
- A method used by individuals to manipulate, deceive, or trick people into revealing confidential information or taking actions that compromise security. It relies on psychological manipulation and often involves impersonating a trusted entity to gain unauthorized access to sensitive data or systems.
- A form of social engineering where the attacker creates a fabricated scenario to obtain information or gain trust. This often involves impersonating someone else, such as a co-worker, to trick individuals into divulging sensitive data.
- A social engineering technique that involves offering something enticing (e.g., a free download, software, or a physical device) to lure individuals into taking actions that compromise their security, such as downloading malicious software or revealing sensitive information.
- A detailed step-by-step process or set of actions that need to be followed to accomplish a specific task or objective. Often provide instructions on how to implement security measures or respond to security incidents.
- The act of spying on someone's computer screen or keypad from a close distance to obtain sensitive information, such as login credentials, PINs, or personal data, without their knowledge or consent.
- Refers to the practice of collecting and analyzing information from publicly available sources, such as social media, websites, and news articles, to gather intelligence about individuals, organizations, or events.
- Involves rummaging through trash or discarded materials, such as documents, hard drives, or electronic devices, in search of information that can be used for malicious purposes, like identity theft or data breaches.
- A social engineering technique that uses phone calls to deceive individuals into revealing personal or financial information. Attackers often impersonate trusted entities to gain the victim's trust.
- A specialized form of spear-phishing that specifically targets high-profile individuals, such as executives or senior management within an organization. The goal is to steal sensitive information or gain access to their accounts.
- A highly targeted form of phishing that focuses on a specific individual, organization, or department. Attackers conduct detailed research to personalize their phishing attempts, making them more convincing.
- A type of social engineering that relies on phone calls to deceive individuals into revealing personal or financial information.
- Malicious software or deceptive advertisements that exploit fear or intimidation to trick users into purchasing fake security software or taking actions that compromise their computer's security. Often displays false alerts about non-existent threats to scare users into paying for a solution.
20 Clues: A type of social engineering that relies on phone calls to deceive individuals into revealing personal or financial information. • The unauthorized access, exploration, or manipulation of computer systems, networks, or data. It can have both positive and negative connotations. • ...
IT 120 - Lesson 7 Configuring SOHO Network Security 2024-10-22
Across
- phase in an attack or penetration test in which the attacker or tester gathers information about the target before attacking it
- biometric camera-based scanner that uses unique features of a palm shown by visible and infrared light
- technique of discovering things about an organization or person based on what they throw away
- information is accessible to those authorized to view or modify it
- mechanism to configure access through a firewall for application that require more than one port
- attack technique where the threat actor disguises their identity or impersonates another user or resource
- AAA protocol used to manage remote and wireless authentication infrastructures
- security entry system with two gateways, only one of which is open at any one time
- type of port forwarding where the external port is forwarded to a different internal port on the LAN
- home router implementation of DMZ where all ports with no existing forwarding rules are opened and directed to a single LAN host
- person or entity responsible for an event that has been identified as a security incident or as a risk
- social engineering attack where an attacker pretends to be someone they are not
- password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords
- system whose configuration is different from its secure baseline
- wireless access point that deceives users into believing that it is a legitimate network access point
- vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability
- weakness that could be triggered accidentally or exploited intentionally to cause a security breach
- security framework and tools that facilitate the use of personally-owned devices to access corporate networks and data
- physical intrusion detection and warning that can use circuit, motion, proximity, and duress triggers
- any type of physical, application, or network attack that affects the availability of a managed resource
- symmetric 128-, 192, or 256-bit block cipher used for bulk encryption in modern security standards
- tactic to obtain someone's password or PIN by observing him or her as it is typed in
- specific method by which malware code infects a target host, often via some vulnerability in a software process
- protocol framework allowing network devices to autoconfigure services
- authentication mechanism that allows a user to present a smartcard to operate an entry system
- allowing a threat actor to enter a site or controlled location without authorization
- security measure used to identify and block suspicious, malicious and/or inappropriate content in accordance with an organization's policies
- an attack that uses multiple compromised hosts to overwhelm a service with request or response traffic
- activity where the goal is to use deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines
- physical security control that uses cameras and recording devices to visually monitor the activity in a certain area
Down
- threat actor who is assigned privileges on the system that cause an intentional or unintentional incident
- email based attack, in which the attacker sends email from a supposedly reputable source to try to elicit private information from the victim
- malicious script hosted on an attacker's site or coded in a link injected onto a trusted site designed to compromise client browsing the trusted site, circumventing the browser's security model of trusted zones
- security barrier designed to prevent unauthorized access to a site perimeter
- protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
- data is stored and transferred as intended and any modification is authorized
- one or more required security controls is missing or misconfigured on a system
- attack where the threat actor makes an independent connection between two victims and is able to read and possible modify traffic
- sturdy vertical post installed to control road traffic or designed to prevent ram-raiding and vehicle-ramming attacks
- form of phishing which targets specific individuals
- cipher that uses mathematically linked public and private keys
- function that converts an arbitrary length string input to a fixed length string output
- software instructions embedded on a hardware device
- technique to gain access to a building by following someone who is unaware of their presence
- hand-held or walkthrough metal detector designed to detect concealed weapons
- password attack that compares encrypted passwords against a predetermined list of possible password values
- likelihood and impact of a threat actor exercising a vulnerability
- standards for authenticating and encrypting access to Wi-Fi networks
- process in which a router takes requests from the Internet for a particular application and sends them to a designated host on the LAN
- two way encryption scheme in which encryption and decryption are both performed by the same key
- physical security mechanisms that ensure a site is sufficiently illuminated for employees and guests to feel safe and for camera-based surveillance systems to work well
- attack that injects a database query into the input data directed at a server by accessing the client side of the application
- character string that identifies a particular wireless LAN
- message digest encrypted using a sender's private key that is appended to a message to authenticate the sender and prove message integrity
- biometric scanner based on analysis of the unique pattern of blood vessels at the back of the eye
- framework for negotiating authentication methods that enables systems to use hardware-based identifiers for authentication and establish secure tunnels through which to submit credentials
- threat actor extracts information while speaking over the phone or VoIP service
- any method by which cryptographic keys are transferred among users, thus enabling the use of a cryptographic algorithm
- certain information should only be known to certain people
- form of phishing which targets senior executives or wealthy individuals
- group of hosts or devices that have been infected by a control program called a bot that enables attacks to exploit the hosts to mount attacks
- physical security device that restricts access to ports and internal components to key holders
- segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports
- single sign-on authentication and authorization service that is based on a time-sensitive, ticket-granting system
- personal authentication mechanism for Wi-Fi networks introduced with WPA3
65 Clues: form of phishing which targets specific individuals • software instructions embedded on a hardware device • character string that identifies a particular wireless LAN • certain information should only be known to certain people • cipher that uses mathematically linked public and private keys • system whose configuration is different from its secure baseline • ...
Air Force Career: Cyber Surety 2021-11-17
Across
- From programming to _____, these experts keep our systems and our information safe.
- Responsible for cybersecurity of national ____ systems.
- Minimum Education: High School ______
- ASVAB requirement
Down
- Completion of 8.5 weeks of Basic _____Training
- Enforce national, DoD, and Air Force security policies and _________
- Status: Enlisted Airmen with credits earned towards _______ Systems Technology
- Ensure all systems comply with ____ security standards.
- Training: 50 ____
9 Clues: Training: 50 ____ • ASVAB requirement • Minimum Education: High School ______ • Completion of 8.5 weeks of Basic _____Training • Ensure all systems comply with ____ security standards. • Responsible for cybersecurity of national ____ systems. • Enforce national, DoD, and Air Force security policies and _________ • ...
chapter 2 2022-11-21
Across
- is a type of EFT transaction; money is deposited directly into a customer's checking acc.
- allow customers to pay for purchases and withdraw cash.
- those people who do the work
- are issued after the sale of stocks.
- is a financial institution that is involved in trading securities in financial markets.
- for sophisticated investors who borrow money to purchase securities.
- is a financial institution that does not accept deposits.
- is a financial investment issued by a corporation, government, or other organization.
- is a document guaranteeing payment of a specific amount of money.
- percent dividend of the stock as a percentage of stock price
- is a bank account used by depositors to accumulate money for future use.
- are largest category of deposits institutions.
- stock holders buy and sell shares of stock from one another with the help of brokers.
- selling stocks and bonds directly to public investors
Down
- is a financial institution that accepts money from costumers and deposits it into the customers account.
- is a security that pay interest over terms of ten to thirty years.
- need to pay for security purchases within three business days of order.
- are for profit businesses that sell insurance produts.
- is a document guaranteeing that a buyer will pay the seller the agreed upon. amount and within the time specified.
- is a security that pays interest over terms ranging from two to ten years.
- is a financial institution that offers and loan services.
- people who lend money to the business in return for a contracted rate of interest or return for their investment.
- is a security that matures in a year or less.
- is a financial institution that provides services for businesses.
- is a bank account that allows that allows the account owner to make deposits, write checks, and withdraw money.
- is a nonprofit financial institution that is privately owned and provides banking services for its members.
- people who buy shares of stock in the company
- is a regular payment made from customer's bank account to a vendor or supplier.
- is a financial institution that makes money by issuing loans; loan company.
- money for real estate, equipment, and so on.
30 Clues: those people who do the work • are issued after the sale of stocks. • money for real estate, equipment, and so on. • is a security that matures in a year or less. • people who buy shares of stock in the company • are largest category of deposits institutions. • selling stocks and bonds directly to public investors • ...
Investment Unit 2024-03-20
Across
- The consequences of taking money out of your retirements account before the required age
- represents a loan from the buyer to the issuer
- federal payroll tax that is deducted from each paycheck to pay for others' social security and earns credits that you will supposedly be paid when you receive social security
- the 60 day period after leaving your company to move the money in your 401k into a new 401k
- intrest on intrest
- the amount of years until social security is expected to run out
- cash from a large group of investors to invest in stocks, bonds and other securities
- digital currency backed by nothing except public impression
- a fund where your money is diversified across multiple companies, giving you a more diverse profile
- the maximum amount of money you can put into the IRA per year
- The increase in the value of an asset
- in a traditional IRA, once you turn 73 you must begin taking out a minimum amount of money from the account each year
- animal representing a bad market
- a unique brief combination of letters that represents the company's stocks
- the number of days you have to rollover your 401k after leaving a company
Down
- the age you collect social security
- investing a small sum regularly into a fund
- the age you start investing
- the money made overtime
- when someone trades based on information on a company because it is announced to the public
- you can put in up to $7000 per year into this retirement account pre-tax but will be taxed when you take the money out
- a sum of money saved or made available for a particular purpose
- you can put in up to $7000 per year into this retirement account post-tax and will not be taxed when you take the money out
- animal representing a good market
- investing a big sum into a fund at once
- expected to run out in 2031
- expected to run out in 2033
- unionized workers receive this when they retire
- when you are guaranteed to receive 100% of the money the company you work for matched for your 401k
- a retirement account managed by your employer that will pay you once you retire a certain percentage of your average salary over the course of specified years
- a security that represents the ownership of a peice of a company
31 Clues: intrest on intrest • the money made overtime • the age you start investing • expected to run out in 2031 • expected to run out in 2033 • animal representing a bad market • animal representing a good market • the age you collect social security • The increase in the value of an asset • investing a big sum into a fund at once • investing a small sum regularly into a fund • ...
Security 2024-11-21
Stock Market Terms Crossword 2020-05-13
Across
- is a period of sustained increases in the prices of stocks, bonds or indices (1wd)
- is a huge company with an excellent reputation. (3wd)
- an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it (4wd)
- the amount by which the ask price exceeds the bid price for an asset in the market (3wd)
- to give/hand over in exchange for money (1wd)
- type of order to purchase or sell a security at a specified price or better.(2wd)
- the buying of a stock, commodity, or currency with the expectation that it will rise in value (2wd)
- an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset, rather than being expensed in the period the cost was originally incurred (1wd)
- the process of offering shares of a private corporation to the public in a new stock issuance. (1wd/3wd)
- a marketplace where securities, commodities, derivatives and other financial instruments are traded (1wd)
- alternative investments using pooled funds that employ different strategies to earn active return, or alpha, for their investors (4wds)
- a unique series of letters assigned to a security for trading purposes(2wd)
- the condition of the financial market in which prices are rising or expected to rise.(2wd)
- a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed. (2wd)
- a trader who executes a large volume of short and long trades to capitalize on intraday market price action (2wd)
- the lowest price a shareholder is willing to part with shares (1wd)
- the marketplace where various national currencies are traded.(1wd)
- a grouping of financial assets such as stocks, bonds, commodities, currencies and cash equivalents, as well as their fund counterparts, including mutual, exchange-traded and closed funds (1wd)
Down
- an investing strategy in which a stock owner purchases additional shares of a previously initiated investment after the price has dropped further. (2wd)
- the completion of a buy or sell order for a security.(1wd)
- the maximum number of shares that a corporation is legally permitted to issue (2wd)
- the money borrowed from a brokerage firm to purchase an investment. It is the difference between the total value of securities held in an investor's account and the loan amount from the broker (1wd)
- a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock(1wd/4wds)
- the ease with which an asset, or security, can be converted into ready cash without affecting its market price (1wd)
- the total quantity of shares or contracts traded for a specified security. (2wd)
- a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations.(2wd)
- a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market.(2wd)
- an individual or firm that acts as an intermediary between an investor and a securities exchange.(1wd)
- the highest price an investor is willing to pay for a share (1wd)
- a statistical measure of the dispersion of returns for a given security or market index. (1wd)
- the portion of shares of a corporation that are in the hands of public investors (2wd)
- the last price at which a security or commodity traded, meaning the most recent price to which a buyer and seller agreed and at which some amount of the asset was transacted(1wd)
- to purchase/obtain in exchange for payment (1wd)
- an asset that tracks a particular set of equities, similar to an index.(1wd/4wds)
- the sale of new or closely held shares by a company that has already made an initial public offering (2wd)
- when a market experiences prolonged price declines (2wd)
- the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders.(1wd)
- the earnings generated and realized on an investment over a particular period of time(1wd)
- an area of the economy in which businesses share the same or a related product or service(1wd)
- a measure of the volatility, or systematic risk, of a security or portfolio, in comparison to the market as a whole (1wd)
40 Clues: to give/hand over in exchange for money (1wd) • to purchase/obtain in exchange for payment (1wd) • is a huge company with an excellent reputation. (3wd) • when a market experiences prolonged price declines (2wd) • the completion of a buy or sell order for a security.(1wd) • the highest price an investor is willing to pay for a share (1wd) • ...
Finance 2024-03-13
Across
- A percentage of the amount borrowed that a user of a loan must pay the lender.
- What's the commonly used acronym for a marketable security that tracks a stock?
- A number between 300 & 850 that determines a person's creditworthiness.
- When a person or organization owes money to someone else is called as ______.
- What do you call a legal entity created by an individual in which one person or institution holds the right to manage property or assets for the benefit of someone else?
- What is the coefficient that measures risk-adjusted performance, factoring in the risk due to the specific security, rather than the overall market?
- Goods or services that are required for survival but are desired are called as _______.
- What term is used to describe the range of price swings of a security or market over time? market over time?
- A way to spend money wisely by calculating net income and expenses to see what you spend your money on.
- What is the amount of current income provided by an investment?
Down
- What is the abbreviation of a type of retirement account in which contributions are deductible from earned income in the calculation of federal and state income taxes if the taxpayer meets certain requirements?
- What financial products value is based on an underlying security, commodity or other financial instrument?
- What kind of contract is standardized, transferable, and exchange-traded and requires delivery of a commodity, bond, currency, or stock index, at a specified price, on a specified future date?
- What do you call evidence of a debt in which the issuer promises to pay the holders of this financial product a specified amount of interest and to repay the principal at maturity?
- What do you call evidence of an investment, either in direct ownership (as with stocks), creditorship (as with bonds), or indirect ownership (as with options)?
- COST The potential loss of other alternatives due to choosing another alternative.
- What kind of funds does a hedge fund use to earn alpha for its investors?
- What is a type of trust created by a person during his or her lifetime?
18 Clues: What is the amount of current income provided by an investment? • A number between 300 & 850 that determines a person's creditworthiness. • What is a type of trust created by a person during his or her lifetime? • What kind of funds does a hedge fund use to earn alpha for its investors? • ...
Introduction to Cybersecurity 2025-06-19
Across
- Fraudulent attempt to steal sensitive data via deceptive emails.
- Incident where data is accessed/stolen without permission.
- Three core security goals: Confidentiality, Integrity, and _______.
- Moral principles governing digital behavior (e.g., privacy, transparency).
Down
- Security system that monitors/controls network traffic (blocks unauthorized access).
- Self-replicating malware that spreads between devices.
- Process of encoding data to prevent unauthorized reading.
- Malicious software designed to damage systems (e.g., viruses, trojans).
- Person who exploits system vulnerabilities.
- Software update to fix security flaws.
10 Clues: Software update to fix security flaws. • Person who exploits system vulnerabilities. • Self-replicating malware that spreads between devices. • Process of encoding data to prevent unauthorized reading. • Incident where data is accessed/stolen without permission. • Fraudulent attempt to steal sensitive data via deceptive emails. • ...
Internet Safety 2025-03-04
Across
- Testing Security For Images To Prevent Theft And Fakes secure from hackers, crooks, and internet thieves
- Make your posts 'friends only' so that only people you know get to see them. If you need to share your phone number or other private information with a friend, do so in a private message - not in a public post.
- Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet.
- Adults seeking to abuse children will go where kids are. As a result, grooming can theoretically happen just about anywhere online
- Never get into 'flaming' someone else on an online forum (ie. insulting them or getting into heated arguments)
- Privacy settings are configurations on digital platforms that allow users to control their personal information and how it is shared with others.
- After all, capital letters on the internet mean shouting and are generally considered impolite.
- While cybersecurity protects devices and networks from harm by third parties, Online Safety protects the people using them from harm by the devices and networks (and therefore third parties) through awareness, education, information and technology.
- Respect the privacy of others. This rule should be followed not only in everyday use of online
- A cookie is a piece of data from a website that is stored within a web browser that the website can retrieve at a later time.
Down
- November 2021) Flaming, also known as roasting, is the act of posting insults, often including profanity or other offensive language, on the internet.
- Never provide personal financial information, including your Social Security number, account numbers or passwords, over the phone or the Internet if you did not initiate the contact.
- Tell your children they do not have to accept any online activity meant to intimidate, threaten, tease, or harm them or anyone else
- recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing.
- Identity theft is the act of stealing a specific person's identifying information and then using it to pretend to be that particular individual. So identity theft can sometimes
- You can help limit the potentially damaging impact of your online presence by searching for yourself, setting alerts and tightening your privacy settings.
- A website that lets users keep a journal or diary on any subject they like and leave comments on other users' posts.
- An online predator is an individual who uses the Internet as a means to commit sexual abuse or harassment, specifically of children
- The use of hacking, malware attacks, or other cyber activity in which an unauthorized user attempts to access sensitive data or intellectual property
- a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.
20 Clues: Respect the privacy of others. This rule should be followed not only in everyday use of online • After all, capital letters on the internet mean shouting and are generally considered impolite. • Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet. • ...
ICT Related Terms 2025-02-03
Across
- a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems Users are typically
- is a binary digit, the smallest increment of data on a computer.
- Browser It's a program on your computer that allows you to connect to the Internet to visit websites, download files, and applications.
- is a network device that both modulates and demodulates analog carrier signals (called sine waves) for encoding and decoding digital information for processing.
- - is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- short for "malicious software," refers to any intrusive software developed by cybercriminals (often called "hackers") to steal data and damage or destroy computers and computer systems.
- a range of frequencies within a given band, in particular that used for transmitting a signal, the transmission capacity of a computer network or other telecommunication system.
- is a type of malware that spreads copies of itself from computer to computer.
- is a malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising.
Down
- are text files with small pieces of data like a username and password that are used to identify your computer as you use a computer network.
- is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.... It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
- is digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system.
- the basic unit of information in computer storage and processing. A byte consists of 8 adjacent binary digits (bits), each of which consists of a 0 or 1....
- is the transmission of wide bandwidth data over a high-speed internet connection.
- an electronic communication setwork that connects computer networks and organizational computer facilities around the world used with except when being used attributively.
- stands for the Completely Automated Public Turing test to tell Computers and Humans Apart.
- the act or an instance of shutting down and restarting something (such as a computer or program).
- is the electronic holding place for the instructions and data a computer needs to reach quickly. It's where information is stored for immediate use.
- Wide Web is an information system where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hyperlinks, and are accessible over the Internet.
- Space is an amount of computer storage space on random-access memory devices, such as on a hard drive, floppy or USB flash drive.
20 Clues: is a binary digit, the smallest increment of data on a computer. • is a type of malware that spreads copies of itself from computer to computer. • is the transmission of wide bandwidth data over a high-speed internet connection. • stands for the Completely Automated Public Turing test to tell Computers and Humans Apart. • ...
Krzyżówka Angielski 2025-12-10
Across
- The right to keep personal data protected.
- Learning skills or knowledge.
- Records of system activities.
- Studying information to understand it.
- Connected computers that share data.
- Instructions written for computers.
- A direct instruction given to a computer.
- The chance that something bad may happen.
- Use of technology to perform tasks without human input.
- A break in security where data is exposed.
- Rules about what is morally right or wrong.
- The ability to manage or direct something.
- A system on which applications can run.
- A tool that blocks unwanted network traffic.
- Continuous flow of data.
- A simplified digital structure used to predict or analyze.
- A tool used to explore or test a system.
- A call for data or a service.
- To follow the path of an action or data flow.
- Following laws, rules, or standards.
- Official rule made by authorities.
- Something unusual that may signal a problem.
- Monitoring to make sure rules are followed.
- Protection against threats or attacks.
- An event that disrupts normal operations.
- A saved copy of data in case of loss.
- A step taken to solve a problem.
- A set of rules for communication.
- Searching for threats inside a network.
- Proof of an event or action.
- A formal review of systems or processes.
- A prediction based on information.
- To watch or track activity.
- A request for information from a database.
- A user identity in a system.
Down
- A sign that danger or problems may occur.
- Unauthorized entry into a system.
- A formal rule or guideline.
- A document describing an event or findings.
- A specific area or internet address space.
- Long-term storage of old files.
- A computer that provides resources to others.
- A place where data is kept.
- A piece of hardware used in computing.
- Delay in data communication.
- A set of connected computer components.
- Someone who monitors or watches activity.
- Programs used by a computer.
- A risk or danger.
- Related to money or cost.
- A part of a larger software system.
- The way a system or user acts.
- Related to investigating cyber incidents.
- Accidental or unlawful release of information.
- To check a system for issues or threats.
- A connection point in a network.
- A secret code to access a system.
- Numerical information used for analysis.
- Belief that someone or something is reliable.
- A person or system chosen for attack.
- Too much data or activity for a system to handle.
- A weakness that can be exploited.
- Converting information into a secure code.
- The path data takes to reach a destination.
- Permission to use or enter a system.
- Measurements used to evaluate performance.
- Information stored or processed by computers.
67 Clues: A risk or danger. • Continuous flow of data. • Related to money or cost. • A formal rule or guideline. • A place where data is kept. • To watch or track activity. • Delay in data communication. • Programs used by a computer. • Proof of an event or action. • A user identity in a system. • Learning skills or knowledge. • Records of system activities. • A call for data or a service. • ...
La unidad 10 2021-04-16
16 Clues: late • board • window • flight • counter • confirm • landing • luggage • customs • takeoff • arrivals • schedule • security • passport • departures • bathrooms(SP)
Exam Vocabulary p7 2021-10-15
16 Clues: macht • policy • gedrag • pesten • dakloos • invloed • armoede • politiek • omgeving • regering • veiligheid • plaatselijk • gemeenschap • maatregelen • maatschappij • reclame maken
เกมค้นหาคำศัพท์ 2025-08-03
16 Clues: มาถึง • ถอดออก • ที่นั่ง • เดินทาง • สายการบิน • เที่ยวบิน • ผู้โดยสาร • บัตรโดยสาร • ออกเดินทาง • ขึ้นเครื่อง • ประตูทางออก • พนักงานขนกระเป๋า • กระเป๋าเป้สะพายหลัง • ระบบรักษาความปลอดภัย • ชั้นโดยสารราคาที่ถูกที่สุด • สายพานที่ใช้รับส่งกระเป๋าในสนามบิน
Unit 5 - Do's and Don'ts 2020-02-02
21 Clues: Lkw • Fall • Helm • Küche • Strom • Schild • Eigentum • Vorsicht • Sicherheit • drogenfrei • Bibliothek • Koch/Köchin • Gehörschutz • Gabelstapler • Schutzbrille • Boden,Fußboden • unbeaufsichtigt • Parkplatz,Parkhaus • Nichtraucherbereich • zerbrechen,kaputtmachen • hinterlassen,stehenlassen
unit 3 2020-12-10
20 Clues: vám • kapu • utas • jóslat • indulás • helyszin • foglalás • egzotikus • mostanában • tetőterasz • csengőhang • mennyország • konferencia • okostelefon • táblák, jelzések • biztonsági ellenörzés • érkezés (repülőtéren) • poggyászszállító kocsi • szöveges üzenetet küld • beszáll ( a repülőgépbe)
Travel, holiday 2020-01-12
20 Clues: jegy • peron • utazás • csomag • útlevél • érkezés • külföld • kilátás • szállás • foglalás • felfedez • leszállás • tengerpart • városnézés • rom, lerombol • luxushajó, óceánjáró • pihenés, kikapcsolódás • indulás, indulási oldal • szórakozás, szórakoztató program • ellenörzés, biztonsági szolgálat
Theme 2 Crime 2024-11-16
24 Clues: rel • dador • steng • aanval • bewijs • getuige • advocaat • dankbaar • oplossen • indringer • opgelucht • rechtzaak • hechtenis • rechtszaak • verzamelen • voorkomend • beveiliging • financiering • zakkenrollen • veroordeling • gerechtigheid • ontwetendheid • afkickkliniek • veronderstellen
POIST 2025-12-15
22 Clues: judge • nurse • singer • banker • doctor • driver • farmer • plumber • teacher • cleaner • musician • engineer • mechanic • scientist • secretary • electrician • salesperson • web developer • security guard • businessperson • computer progammer • computer technician
WRS 15 & 16 - DA Puzzle 2023-12-01
Across
- data converted into a meaningful and useful context
- malware disguised as a trusted source that convinces the user to open a link or an attachment and install itself.
- using the Internet for anything other than work tasks
- includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network; usually requires the user to initiate by unwittingly installing the malicious software
- the level one exposes one's self or professional network to unethical intentions (e.g., end-user attacks, server-side attacks)
- pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
- to support with evidence or authority; to make more certain
- a particular preference or point of view that is personal, rather than scientific.
- malware that accesses or controls a device without being detected
- a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system
- something that furnishes proof
- the protection of information systems against unauthorized access (e.g., hacking, identity theft)
- believable; reliable
- a flaw or weakness that allows a threat agent to bypass security
- a formal document with which many organizations require employees to comply, addressing the separation of personal and workplace use of the Internet, email etiquette, and security measures and safeguards that employees must obey.
- using online services and social networking ethically, by being a good online citizen, by adhering to privacy and safety guidelines, and by facilitating thoughtful and considerate communication with others
- a website that allows people of similar interests to interact and exchange information that is typically personal
Down
- the ability to figure out the type of information you need, find that information, evaluate it, and properly use it
- connected with or related to the matter at hand
- unbiased; neutral
- using the Internet, ethically, for work-related tasks
- a server-side attack that allows hackers to be able to target vulnerabilities on any site you use to login, then they apply that same login information to other major consumer sites to see if you reused your login and password
- unethical and often unnoticed attacks by others in the public sphere when operating online (e.g., malware, phishing, Trojan horse, virus, worm, spam, rootkit)
- the unethical distribution of mass digital messages. This is the main way that malware is opened and spread
- cyber attack that targets the server side to get customer information from the database, such as credit card numbers
- book, article, person, or other resource consulted for information.
- examine and judge carefully
- attacks focused on the workplace Network workers access.
- malware that spreads by users from an infected device to the rest of the devices on a network/system
29 Clues: unbiased; neutral • believable; reliable • examine and judge carefully • something that furnishes proof • connected with or related to the matter at hand • data converted into a meaningful and useful context • using the Internet, ethically, for work-related tasks • using the Internet for anything other than work tasks • ...
