cyber security Crossword Puzzles

SSHE 2023-11-16

SSHE crossword puzzle
Across
  1. sdkjfalskdjfalsdkjf
  2. alsdkjfalkdjf
  3. kasdjfalskdjflaks
  4. kasjdflkasjfl
  5. sadkjfalklsdjfa
  6. askdjfalklsjdfladsk
  7. askdjfaskdjf
  8. dkjflsadkjf
Down
  1. askdjfalkdjfals
  2. sdkjfalskjf
  3. sasdfalsdf
  4. asdkjfaksdjf
  5. adflkajsdlkfj
  6. kdjfalskdjfalsk
  7. asdkjflaskdjf
  8. sdkjfalskf

16 Clues: sasdfalsdfsdkjfalskfsdkjfalskjfdkjflsadkjfasdkjfaksdjfaskdjfaskdjfadflkajsdlkfjalsdkjfalkdjfasdkjflaskdjfkasjdflkasjflaskdjfalkdjfalskdjfalskdjfalsksadkjfalklsdjfakasdjfalskdjflakssdkjfalskdjfalsdkjfaskdjfalklsjdfladsk

Gun control vocabs 2024-11-14

Gun control vocabs crossword puzzle
Across
  1. weapon
  2. topic
  3. poll
  4. firearms
  5. beagainst
  6. safety
  7. debatable
  8. remainder
  9. groupofinterests
Down
  1. reachagoal
  2. carryaweapon
  3. stop
  4. necessary
  5. owningaweapon
  6. reachable
  7. supporter

16 Clues: stoppolltopicweaponsafetyfirearmsnecessarybeagainstreachablesupporterdebatableremainderreachagoalcarryaweaponowningaweapongroupofinterests

Networking Concepts , Cyber Ethics 2025-06-15

Networking Concepts , Cyber Ethics crossword puzzle
Across
  1. Wide
  2. Privacy
  3. Access
  4. Manners
  5. Rules
  6. Connect
  7. Copying
Down
  1. Virus
  2. Internet
  3. Service
  4. Security
  5. Adress
  6. Device
  7. Stealing
  8. Harassment
  9. Local

16 Clues: WideVirusRulesLocalAccessAdressDevicePrivacyServiceMannersConnectCopyingInternetSecurityStealingHarassment

Лудкечпи 2020-03-10

Лудкечпи crossword puzzle
Across
  1. нарушитель защиты
  2. лэптоп
  3. осведомленность
  4. запутанный
  5. злоупотребление
  6. надёжность
  7. безопасность
  8. целостность данных
Down
  1. результат, проблема
  2. масса,куча
  3. доступность
  4. код,шифр
  5. цель
  6. финансовые средства
  7. последствие
  8. добиваться
  9. средства, имущество
  10. страшный
  11. опора
  12. быстрый

20 Clues: цельопоралэптопбыстрыйкод,шифрстрашныймасса,кучадобиватьсязапутанныйнадёжностьдоступностьпоследствиебезопасностьосведомленностьзлоупотреблениенарушитель защитыцелостность данныхрезультат, проблемафинансовые средствасредства, имущество

german vocab 2023-02-22

german vocab crossword puzzle
Across
  1. name
  2. pillow
  3. hail
  4. treasure
  5. school
  6. press
  7. beer
  8. victory
  9. recovery
  10. courage
  11. to drive
  12. stove
  13. grandmother
Down
  1. to waste or squander
  2. to recommend
  3. security
  4. marriage license bureau
  5. negotiation
  6. garden
  7. movie

20 Clues: namehailbeerpressstovemoviepillowschoolgardenvictorycouragesecuritytreasurerecoveryto drivenegotiationgrandmotherto recommendto waste or squandermarriage license bureau

Ch 10 crossword 2024-02-23

Ch 10 crossword crossword puzzle
Across
  1. window
  2. delay
  3. security checkpoint
  4. takeoff
  5. aisle
  6. flight number
  7. passenger
  8. trunk
  9. runway
  10. compartment
  11. ID
Down
  1. aboard
  2. depart time
  3. late
  4. passport
  5. on time
  6. going
  7. automatic
  8. to board
  9. to land

20 Clues: IDlatedelayaislegoingtrunkaboardwindowrunwaytakeoffon timeto landpassportto boardpassengerautomaticdepart timecompartmentflight numbersecurity checkpoint

Chromebook Crossword 2023-05-29

Chromebook Crossword crossword puzzle
Across
  1. storage
  2. apps
  3. on paper
  4. pointer
  5. cover
  6. connection
  7. simple
  8. safety
  9. working
  10. privacy
  11. fast
  12. powerpoint
  13. word
Down
  1. internet
  2. operating system
  3. browser
  4. protection
  5. gaming
  6. maximum boot up seconds
  7. gamepass
  8. excel

21 Clues: appsfastwordcoverexcelgamingsimplesafetystoragebrowserpointerworkingprivacyinterneton papergamepassprotectionconnectionpowerpointoperating systemmaximum boot up seconds

En el aeropuerto 2023-10-02

En el aeropuerto crossword puzzle
Across
  1. screen
  2. suitcase
  3. flight
  4. hand luggage
  5. tourist information
  6. currency exchange
  7. passenger
Down
  1. baggage claim
  2. check-in
  3. departures
  4. passport
  5. security
  6. arrivals
  7. country
  8. boarding pass
  9. city
  10. gate
  11. elevator
  12. car hire
  13. airplane

20 Clues: citygatescreenflightcountrycheck-inpassportsecurityarrivalssuitcaseelevatorcar hireairplanepassengerdepartureshand luggagebaggage claimboarding passcurrency exchangetourist information

Security Controls 2022-05-30

Security Controls crossword puzzle
Across
  1. A control acts to eliminate or reduce the impact of an intrusion event
  2. a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.
  3. A control that acts to eliminate or reduce the likelihood that an attack can succeed
  4. The security controls that provide oversight of the information system.
Down
  1. A type of security control that discourages intrusion attempts
  2. A control may not prevent or deter access, but it will identify and record any attempted or successful intrusion
  3. A type of security control that acts against in-person intrusion attempts
  4. Security controls focused on the things done by people.
  5. The hardware and software components that protect a system against cyberattacks.

9 Clues: Security controls focused on the things done by people.A type of security control that discourages intrusion attemptsA control acts to eliminate or reduce the impact of an intrusion eventThe security controls that provide oversight of the information system.A type of security control that acts against in-person intrusion attempts...

end of 2019 2019-12-30

end of 2019 crossword puzzle
Across
  1. salah satu jenis kopi
  2. merk kalkulator di toko
  3. pahlawan di uang Rp2000 "M.husni hoesni ....."
  4. salah satu marketplace di Indonesia
  5. salah satu merk air mineral (tanpa spasi)
  6. salah satu kecamatan di jakarta pusat
  7. jumlah kursi plastik biru di toko
  8. kepanjangan T dihuruf T di ITC mangga dua
  9. kurir dengan tagline "Ketika semua jadi mudah"
  10. warna tulisan security di meja security lantai 5
Down
  1. menteri pendidikan 2020 (..... Makarim)
  2. garansi memory V-gen
  3. merk sepatu
  4. kota ( bukan negara) asal UGREEN
  5. Kota ( bukan negara )asal Akitio
  6. warna background logo Logitech Pelangi komputer
  7. nama salah satu mantan kurir Rajakom (kecil hitam)
  8. nama toko computer di samping semar
  9. merk monitor tv di lift
  10. salah satu merk laptop

20 Clues: merk sepatugaransi memory V-gensalah satu jenis kopisalah satu merk laptopmerk kalkulator di tokomerk monitor tv di liftkota ( bukan negara) asal UGREENKota ( bukan negara )asal Akitiojumlah kursi plastik biru di tokosalah satu marketplace di Indonesianama toko computer di samping semarsalah satu kecamatan di jakarta pusat...

Curricula Crossword 2022-03-18

Curricula Crossword crossword puzzle
Across
  1. what its called to surf the net
  2. service organization's controls
  3. pay this software to get your info back
  4. telecommunication message from phone
  5. a dishonest scheme; a fraud.
  6. telecommunication message from computer
  7. is able to subvert computer security.
  8. freedom from unauthorized intrusion
  9. Scammers want you to buys these for them
  10. a hacker's best friend
  11. hackers hide in me, and you love me
Down
  1. software intended to damage a computer
  2. share all your fav things with me
  3. double your safety using this
  4. following someone else into a building
  5. Deedee's toy and sidekick
  6. pink dress and an amazing hacker
  7. ethical principle of holding information
  8. the stronger the better
  9. I work security in Curriculaville

20 Clues: a hacker's best friendthe stronger the betterDeedee's toy and sidekicka dishonest scheme; a fraud.double your safety using thiswhat its called to surf the netservice organization's controlspink dress and an amazing hackershare all your fav things with meI work security in Curriculavillefreedom from unauthorized intrusion...

Security Crossword Challenge 2015-02-18

Security Crossword Challenge crossword puzzle
Across
  1. 3rd President
  2. 18th President
  3. 1st President
  4. Taking of items
  5. 1st Ambassador to France
  6. Cash or valuables in transit
  7. 1st Secretary of Treasury
  8. Opens many doors
Down
  1. Secures your money
  2. Funny Money
  3. 16th President
  4. Unusual Behavior
  5. Used to make change
  6. 7th President
  7. Director of Security

15 Clues: Funny Money3rd President1st President7th President16th President18th PresidentTaking of itemsUnusual BehaviorOpens many doorsSecures your moneyUsed to make changeDirector of Security1st Ambassador to France1st Secretary of TreasuryCash or valuables in transit

Security Crossword Puzzle 2022-04-20

Security Crossword Puzzle crossword puzzle
Across
  1. Located at each desk and teller unit in the branch
  2. Employees will be asked to ______ the robber
  3. All employees are expected to follow ______ when in the vault
  4. _____ the bank is done at the beginning and end of each day
  5. Clean _____ policy
  6. Each branch has an _______ sign to signal it is safe to enter the branch
Down
  1. After a robbery, employees will be asked to reconstruct their last five _______
  2. _____ is one of the easiest ways to prevent a robbery
  3. If emailing sensitive information, _____ must be used
  4. The robbery packets also include a _______ checklist
  5. _____ code can be used by employees to activate the alarms
  6. Contact the ______ department to notify them of the robbery
  7. Remain _____ during a robbery
  8. Rocky Mountain Safe _______ Task Force will be involved after a robbery
  9. Hold-up _______

15 Clues: Hold-up _______Clean _____ policyRemain _____ during a robberyEmployees will be asked to ______ the robberLocated at each desk and teller unit in the branchThe robbery packets also include a _______ checklist_____ is one of the easiest ways to prevent a robberyIf emailing sensitive information, _____ must be used...

Social Security Card 2025-04-10

Social Security Card crossword puzzle
Across
  1. alien, A person from another country who can live or work in the U.S.
  2. of identity, A document that shows your name and who you are.
  3. To finish all parts of something.
  4. A document that shows who you are.
  5. Related or connected to the topic.
  6. Being a legal member of a country.
Down
  1. A form you fill out to ask for something officially.
  2. Done by choice, not required.
  3. To say something officially.
  4. A group of people with similar physical features or ancestry.
  5. out, To write all the needed information on a form.
  6. Allowed or qualified to do or receive something.
  7. Security card, An official card with a number used by the U.S. government to track your earnings and benefits.
  8. country, A country that is not your home country.
  9. To not do something or leave it out.
  10. guardian: A person with the legal right to care for another person.

16 Clues: To say something officially.Done by choice, not required.To finish all parts of something.A document that shows who you are.Related or connected to the topic.Being a legal member of a country.To not do something or leave it out.Allowed or qualified to do or receive something.country, A country that is not your home country....

9Health Crossword Bullying 2024-09-15

9Health Crossword Bullying crossword puzzle
Across
  1. Do not
  2. What should you not do back?
  3. When someone doesn't include you
  4. Bullying someone can ruin someone self
  5. Spreading lies about people
  6. Bullying Online
  7. Someone who stands up for others
  8. Bullying someone by their skin colour
  9. Bullying someone because of their mental and physical condition
Down
  1. Age group that gets bullied the most
  2. Using private information to get something from someone
  3. A place where most bullying takes place at
  4. Using Words
  5. People go here to feel better
  6. Someone who just watches people being bullied
  7. making others do stuff they don't want to do
  8. When your getting bullied tell a trusted
  9. Bullying that ruins someones reputation
  10. what is the person being bullied called
  11. What is the person bullying called

20 Clues: Do notUsing WordsBullying OnlineSpreading lies about peopleWhat should you not do back?People go here to feel betterWhen someone doesn't include youSomeone who stands up for othersWhat is the person bullying calledAge group that gets bullied the mostBullying someone by their skin colourBullying someone can ruin someone self...

Security 2013-04-02

Security crossword puzzle
Across
  1. / a financial arrangement used to protect individuals or business against financial loss.
  2. / consists of actions taken to prevent crime and to protects the safety of people and property.
  3. / a safe deposit box that is usually kept in a large locked room.
  4. / the process of closely observing what is going on in an area.
Down
  1. / pays for losses due to crimes such as theft, arson, forgery, and embezzlement.
  2. / is knowing where all hotel keys are located at all times and knowing who has each key

6 Clues: / the process of closely observing what is going on in an area./ pays for losses due to crimes such as theft, arson, forgery, and embezzlement./ a safe deposit box that is usually kept in a large locked room./ is knowing where all hotel keys are located at all times and knowing who has each key...

security 2014-02-27

security crossword puzzle
Across
  1. look into the camera
  2. voice pattern
  3. method to identify people
  4. place hand on scanner
  5. type of physiological characteristic
Down
  1. no identity number needed

6 Clues: voice patternlook into the cameraplace hand on scannerno identity number neededmethod to identify peopletype of physiological characteristic

security 2021-08-18

security crossword puzzle
Across
  1. I am testin gthis out
  2. a color I like
  3. director cybersecurity
Down
  1. a way to protect data
  2. a way to look at the sun
  3. a way to protect users

6 Clues: a color I likea way to protect dataI am testin gthis outa way to protect usersdirector cybersecuritya way to look at the sun

security 2023-02-08

security crossword puzzle
Across
  1. a computer problem
  2. Likes to chase mice
  3. Flying mammal
Down
  1. Has a trunk
  2. Man's best friend
  3. Large marsupial

6 Clues: Has a trunkFlying mammalLarge marsupialMan's best frienda computer problemLikes to chase mice

Cyber Security Homework 1 Year 8 2025-10-15

Cyber Security Homework 1 Year 8 crossword puzzle
Across
  1. A self-replicating malware that spreads without user action.
  2. Crime involving stealing someone's personal information
  3. A type of malware that attaches itself to clean files.
Down
  1. Software designed to damage or disrupt systems
  2. A type of malware that pretends to be legitimate software
  3. A scam where attackers trick users into giving personal information

6 Clues: Software designed to damage or disrupt systemsA type of malware that attaches itself to clean files.Crime involving stealing someone's personal informationA type of malware that pretends to be legitimate softwareA self-replicating malware that spreads without user action.A scam where attackers trick users into giving personal information

Unit 15-16 2023-03-13

Unit 15-16 crossword puzzle
Across
  1. turvalisus
  2. deklareerima
  3. lomp
  4. tegelik
  5. aksessuaar
  6. rabav
  7. padi
Down
  1. sadam
  2. karistus
  3. trahv
  4. vahekäik
  5. kellegi kallal norima
  6. kandik
  7. pardapääse
  8. tankla
  9. kirurg
  10. toll

17 Clues: lomptollpadisadamtrahvrabavkandiktanklakirurgtegelikkaristusvahekäikturvalisuspardapääseaksessuaardeklareerimakellegi kallal norima

MIKOŁAJ'S CROSSWORD 2018-11-14

MIKOŁAJ'S CROSSWORD crossword puzzle
Across
  1. BŁĄD
  2. KOMÓRKA
  3. PRODUKOWAĆ
  4. ROBOTYKA
  5. ŚRODOWISKO
  6. POŁĄCZYĆ
  7. ZAPROJEKTOWAĆ
  8. USTAWIENIA
  9. GALAKTYKA
Down
  1. BADANIA
  2. EKOLOGIA
  3. WTYCZKA
  4. WYNALAZEK
  5. DANE
  6. BEZPIECZEŃSTWO
  7. DATA WYSŁAĆ DANE
  8. WPROWADZIĆ

17 Clues: BŁĄDDANEBADANIAKOMÓRKAWTYCZKAEKOLOGIAROBOTYKAPOŁĄCZYĆWYNALAZEKGALAKTYKAPRODUKOWAĆWPROWADZIĆŚRODOWISKOUSTAWIENIAZAPROJEKTOWAĆBEZPIECZEŃSTWODATA WYSŁAĆ DANE

Total Defence Day 2023 - Digital Defence (P4-6) 2023-02-07

Total Defence Day 2023 - Digital Defence (P4-6) crossword puzzle
Across
  1. Cyber criminals will ask you for ______________ information like phone numbers, banking details and One-Time Passwords(OTPs).
  2. Scammers will ______________ your friends or Whatsapp support team to get your one-time code.
  3. Always practice good cyber ______________ to ensure your accounts are safe.
Down
  1. Malicious malware can cause the program to ______________.
  2. We can use ______________ as our passwords e.g. Saw Eagle At The Park.

5 Clues: Malicious malware can cause the program to ______________.We can use ______________ as our passwords e.g. Saw Eagle At The Park.Always practice good cyber ______________ to ensure your accounts are safe.Scammers will ______________ your friends or Whatsapp support team to get your one-time code....

Internet safety crossword 2023-03-06

Internet safety crossword crossword puzzle
Across
  1. It is important to _______ any incidences of cyber-bullying to an adult or someone you trust.
  2. It is also important to keep any __________ of cyber-bullying.
Down
  1. The internet is ________, which means that what you post online is difficult to remove.
  2. You should never post personal information on the internet, such as your ________ phone number.
  3. Other types of personal information include your _____ address.

5 Clues: It is also important to keep any __________ of cyber-bullying.Other types of personal information include your _____ address.The internet is ________, which means that what you post online is difficult to remove.It is important to _______ any incidences of cyber-bullying to an adult or someone you trust....

Module 8 Crossword 2024-03-02

Module 8 Crossword crossword puzzle
Across
  1. is still a problem in many state and federal prisons, despite new prison construction and decline in use of imprisonment
  2. ________ security Inmates have more freedom to associate with each other
  3. The number of inmates a prison can effectively accommodate, based on management considerations
  4. The size of the correctional population an institution can effectively hold
Down
  1. Most people sentenced to federal prison were convicted of ______ law violations
  2. Most people sentenced to state prisons were convicted of ________ crimes
  3. The number of inmates a prison can handle, according to experts (yields highest capacities)
  4. The number of inmates a prison originally built to hold
  5. _______ security holds Death-row inmates all maximum-security prisoners
  6. _______ security Inmates generally housed in dormitory-like settings

10 Clues: The number of inmates a prison originally built to hold_______ security Inmates generally housed in dormitory-like settings_______ security holds Death-row inmates all maximum-security prisonersMost people sentenced to state prisons were convicted of ________ crimes________ security Inmates have more freedom to associate with each other...

Intro to Cybersecurity Vocabulary 2025-10-14

Intro to Cybersecurity Vocabulary crossword puzzle
Across
  1. set of security controls designed to protect payment account security such as credit or debit card transactions
  2. protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks
  3. crime committed over the internet
  4. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
  5. set of policies and procedures meant to improve and guide an organization’s cybersecurity practices
  6. occur when hackers or malicious software gains unauthorized access to a system, examples include: hacker cracking passwords, breaking into a server or changing a user’s privileges on their system
Down
  1. set of best practice recommendations for information security management
  2. unique skills for a specific area
  3. attempt to steal, damage or destroy information on a device or computer system
  4. individual who participates in hacking
  5. abilities needed to communicate and work with others
  6. prevents a user from accessing a system
  7. act of skirting or breaking through security boundaries

13 Clues: unique skills for a specific areacrime committed over the internetindividual who participates in hackingprevents a user from accessing a systemabilities needed to communicate and work with othersact of skirting or breaking through security boundariesset of best practice recommendations for information security management...

Vocabulario de artículo 2021-02-25

Vocabulario de artículo crossword puzzle
Across
  1. entertainment
  2. unemployment
  3. city
  4. clean
  5. theme park
  6. town
  7. dangerous
  8. narrow
  9. cameras
Down
  1. spaces
  2. pollution
  3. sports center
  4. far
  5. streets
  6. port
  7. security
  8. ugly

17 Clues: farcityporttownuglycleanspacesnarrowstreetscamerassecuritypollutiondangeroustheme parkunemploymententertainmentsports center

lentokenttäsanastoa 2021-11-19

lentokenttäsanastoa crossword puzzle
Across
  1. hihna
  2. lentokone
  3. saapua
  4. portti
  5. matkustaa
  6. turvallisuus
  7. terminaali
Down
  1. passi
  2. lähteä
  3. nousta kulkuneuvoon
  4. istumapaikka
  5. lento
  6. lentokenttä
  7. matkalaukku
  8. loma
  9. laukku
  10. lähtöselvitys

17 Clues: lomapassihihnalentolähteäsaapuaporttilaukkulentokonematkustaaterminaalilentokenttämatkalaukkuistumapaikkaturvallisuuslähtöselvitysnousta kulkuneuvoon

UNFPA SFPs 2021-05-10

UNFPA SFPs crossword puzzle
Across
  1. Security Risk Management Measures
  2. Global Directory
Down
  1. tool for reporting security incidents
  2. Security Communications Systems
  3. Portal used by personnel with sec.responsibilities
  4. Residential Security Measures
  5. UNDSS app for headcount and flash reports

7 Clues: Global DirectoryResidential Security MeasuresSecurity Communications SystemsSecurity Risk Management Measurestool for reporting security incidentsUNDSS app for headcount and flash reportsPortal used by personnel with sec.responsibilities

cyber safety NIC PulcIanI 2016-05-25

cyber safety    NIC PulcIanI crossword puzzle
Across
  1. talk and put photos that everyone can see
  2. communicate
  3. a persones detail
  4. steeling money from someone
  5. stolen information
  6. keep something to yourself
  7. method
  8. find something you want to know about
  9. female or male
Down
  1. information site
  2. a website containing writers opinion
  3. unwanted mail in your email account
  4. something mean cent to you
  5. one in a class
  6. someone who keeps you safe
  7. talk to someone
  8. internet
  9. to keep something safe
  10. illegally getting into someone's account
  11. something disgusting

20 Clues: methodinternetcommunicateone in a classfemale or maletalk to someoneinformation sitea persones detailstolen informationsomething disgustingto keep something safesomething mean cent to yousomeone who keeps you safekeep something to yourselfsteeling money from someoneunwanted mail in your email accounta website containing writers opinion...

Cyber Safety-Irene Jose 2016-05-25

Cyber Safety-Irene Jose crossword puzzle
Across
  1. program that lets you find,see and hear material
  2. bad thing that can ruin your device
  3. you can chat on with family and friends
  4. method of sending short messages
  5. small hand-controlled device for pointing and clicking
  6. send information from one computer to another computer
  7. name that a user has chosen for you
  8. program,or set of instructions
  9. website for you so you can search
  10. search engine visual for parents mostly
Down
  1. upload information to the web
  2. starting point on the web
  3. add that automatically comes onto the screen
  4. you can send to others
  5. adviser that teaches you how to use technology
  6. security system to keep your things safe
  7. secrets code that unlocks something for you
  8. giant collection of networks of networks
  9. Engine,an Internet service that helps you find information on the website
  10. Tag,the nickname a user has chosen to be identified when playing Internet Games

20 Clues: you can send to othersstarting point on the webupload information to the webprogram,or set of instructionsmethod of sending short messageswebsite for you so you can searchbad thing that can ruin your devicename that a user has chosen for youyou can chat on with family and friendssearch engine visual for parents mostly...

Cyber Safety-Irene Jose 2016-05-25

Cyber Safety-Irene Jose crossword puzzle
Across
  1. program that lets you find,see and hear material
  2. bad thing that can ruin your device
  3. you can chat on with family and friends
  4. method of sending short messages
  5. small hand-controlled device for pointing and clicking
  6. send information from one computer to another computer
  7. name that a user has chosen for you
  8. program,or set of instructions
  9. website for you so you can search
  10. search engine visual for parents mostly
Down
  1. upload information to the web
  2. starting point on the web
  3. add that automatically comes onto the screen
  4. you can send to others
  5. adviser that teaches you how to use technology
  6. security system to keep your things safe
  7. secrets code that unlocks something for you
  8. giant collection of networks of networks
  9. Engine,an Internet service that helps you find information on the website
  10. Tag,the nickname a user has chosen to be identified when playing Internet Games

20 Clues: you can send to othersstarting point on the webupload information to the webprogram,or set of instructionsmethod of sending short messageswebsite for you so you can searchbad thing that can ruin your devicename that a user has chosen for youyou can chat on with family and friendssearch engine visual for parents mostly...

Cyber Safety-Irene Jose 2016-05-25

Cyber Safety-Irene Jose crossword puzzle
Across
  1. program that lets you find,see and hear material
  2. bad thing that can ruin your device
  3. you can chat on with family and friends
  4. method of sending short messages
  5. small hand-controlled device for pointing and clicking
  6. send information from one computer to another computer
  7. name that a user has chosen for you
  8. program,or set of instructions
  9. website for you so you can search
  10. search engine visual for parents mostly
Down
  1. upload information to the web
  2. starting point on the web
  3. add that automatically comes onto the screen
  4. you can send to others
  5. adviser that teaches you how to use technology
  6. security system to keep your things safe
  7. secrets code that unlocks something for you
  8. giant collection of networks of networks
  9. Engine,an Internet service that helps you find information on the website
  10. Tag,the nickname a user has chosen to be identified when playing Internet Games

20 Clues: you can send to othersstarting point on the webupload information to the webprogram,or set of instructionsmethod of sending short messageswebsite for you so you can searchbad thing that can ruin your devicename that a user has chosen for youyou can chat on with family and friendssearch engine visual for parents mostly...

Cyber safety-Alexander Sladic 2016-05-23

Cyber safety-Alexander Sladic crossword puzzle
Across
  1. a dishonest scheme
  2. a way of publishing photos online
  3. protecting your personal information
  4. a person, known or unknown, that sends unexpected rude messages
  5. something to keep you entertained
  6. the environment of the Internet
  7. what you find on the Internet on a certain topic
  8. a collection of information on the Internet
  9. who you appear to be online
  10. unwanted messages
Down
  1. what you use to protect your electronic equipment and access
  2. something that can infect your device
  3. a way of sending and receiving mail electronically
  4. a way of getting something from the Internet
  5. the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organisation
  6. an online diary
  7. a device produced by Apple
  8. an online resource that helps you find information and connect with people
  9. attempts by scammers to trick you into giving out your personal information
  10. a way of communicating online

20 Clues: an online diaryunwanted messagesa dishonest schemea device produced by Applewho you appear to be onlinea way of communicating onlinethe environment of the Interneta way of publishing photos onlinesomething to keep you entertainedprotecting your personal informationsomething that can infect your devicea collection of information on the Internet...

860 OSS Cyber Squad 2022-04-29

860 OSS Cyber Squad crossword puzzle
Across
  1. Shrek "Far Far Away"
  2. Kings of the Jungles
  3. Ruler of a country
  4. Explosion
  5. Famous Potato Chips
  6. THC
  7. The newest member
  8. Earth
  9. "The Great" Leader
  10. One Woman Show
  11. Kitchen Appliance
  12. Return to Sender via Biloxi
  13. Bart and Homer
  14. Empire State Building
  15. Best Buy Squad
  16. Liquor without "ch"
Down
  1. Movie Projector
  2. Porcupine
  3. Michigan Superior Ontario
  4. Mini Explosion
  5. Flowers and Roses
  6. Mound
  7. Aspen Colorado
  8. Personal Trainer
  9. Adam Eve
  10. Safety Concerns
  11. Boisterous
  12. Forged by the sea

28 Clues: THCMoundEarthAdam EvePorcupineExplosionBoisterousMini ExplosionAspen ColoradoOne Woman ShowBart and HomerBest Buy SquadMovie ProjectorSafety ConcernsPersonal TrainerFlowers and RosesThe newest memberKitchen ApplianceForged by the seaRuler of a country"The Great" LeaderFamous Potato ChipsLiquor without "ch"Shrek "Far Far Away"Kings of the Jungles...

Cyber Crossword | Easy 2 2023-07-06

Cyber Crossword | Easy 2 crossword puzzle
Across
  1. The assurance that information is disclosed only to authorised entities.
  2. The disclosure of information to unauthorised persons, or a violation of the security policy of a system in which unauthorised intentional or unintentional disclosure, modification, destruction or loss of an object may have occurred.
  3. A feature or defect of a computer system that allows access to data by bypassing normal security measures.
  4. An event that is not part of normal operations that disrupts operational processes.
  5. A defect, fault or imperfection, especially one that is hidden or unknown.
  6. The methods used to manipulate people into carrying out specific actions, or divulging information.
  7. Self-replicating malware that uses a network to distribute copies of itself to other computer devices, often without user intervention.
  8. A virtual space in which new, untrusted or untested software or coding can be run safely without risking harm to the hosting computer.
  9. A deliberate act through cyberspace to manipulate, disrupt, deny, degrade or destroy computers or networks, or the information resident on them, with the effect of seriously compromising national security, stability or economic prosperity.
  10. The use of online advertising to spread malware. Involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.
Down
  1. A software program or group of software programs designed for end users.
  2. A type of attack where a message is made to look like it comes from a trusted source. For example, an email that looks like it comes from a legitimate business, but is actually trying to spread malware.
  3. Measurable physical characteristics used to identify or verify an individual.
  4. The principle of restricting an individual’s access to only the information they require to fulfil the duties of their role.
  5. A control system architecture comprising computers, networked data communications and graphical user interfaces for high-level process supervisory management. It also comprises other peripheral devices like programmable logic controllers and discrete proportional-integral-derivative controllers used to interface with process plant or machinery.
  6. A form of false advertisement which uses links that are designed to attract attention and entice users to follow that link and read, view or listen to the linked content, with a defining characteristic of being deceptive, typically sensationalised or misleading.
  7. The ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
  8. A collection of data or instructions that tell a computer how to work.
  9. Malicious software that makes data or systems unusable until the victim makes a payment.
  10. Setting up a fake website (or compromising a real one) in order to infect and exploit visiting users.

20 Clues: A collection of data or instructions that tell a computer how to work.A software program or group of software programs designed for end users.The assurance that information is disclosed only to authorised entities.A defect, fault or imperfection, especially one that is hidden or unknown....

CYBER AND DIGITAL LITERACY 2024-05-02

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. systematic investigation into and study of materials and sources
  2. action or omission that constitutes an offense that may be prosecuted
  3. any program or utility that helps programmers or users
  4. the fact of being who or what a person or thing is
  5. having special and usually practical knowledge
  6. he act of posting or reposting content on your social media
  7. a file or code, typically delivered over a network
  8. the imparting or exchanging of information or news
  9. the condition of being safe from undergoing
  10. he protection of computer systems and information
  11. complex configuration composed of hardware
  12. system that connects two or more computing devices
  13. the process by which topic ideas that appeal
  14. personal information
  15. spreads between computers and causes damage
  16. a computer or system that provides resources, data, services, or programs
  17. a set of instructions, data or programs used to operate computers
  18. organized or classified data, which has some meaningful values for the receiver
  19. the recording, reproducing, or broadcasting of moving visual images
  20. action of working with someone to produce or create something
  21. control the functioning of a system
Down
  1. available on or performed using the internet or other computer network
  2. a microcomputer designed for use by one person at a time
  3. acquisition of knowledge or skills through experience
  4. the innovative use of digital tools and technologies during teaching and learning
  5. anything you share on social media
  6. to make additions, deletions, or other changes
  7. a media type displayed as visual information
  8. knowledge and ability to use computers
  9. create, share, and/or exchange information and ideas in virtual communities
  10. information that can be interpreted and used by computers
  11. To store data on and retrieve data from a disk or other peripheral device
  12. the act of compromising digital devices and networks
  13. the protection of computer systems
  14. any electronic or online account
  15. a secret word or expression used by authorized persons
  16. he main means of mass communication
  17. creating globalized accounts on each relevant platform
  18. to deliver messages across computer networks
  19. the application of scientific knowledge to the practical aims of human life
  20. relating to or characteristic of the culture of computers
  21. a global network of billions of computers and other electronic devices
  22. a digitally replicated version of something real
  23. a detailed examination of anything complex
  24. a person who utilizes a computer or network service
  25. potential negative action
  26. electronic technology that generates
  27. device that accepts information
  28. online journal or information website
  29. relating to the present or recent times

50 Clues: personal informationpotential negative actiondevice that accepts informationany electronic or online accountanything you share on social mediathe protection of computer systemshe main means of mass communicationcontrol the functioning of a systemelectronic technology that generatesonline journal or information website...

CYBER AND DIGITAL LITERACY 2024-04-30

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. is an expanded conceptualization of literacy that includes the ability to access and analyze media
  2. These are schemes that deceive the users in various ways in an attempt totake advantage of them
  3. is the ability to access, manage, understand, integrate, communicate, evaluate and create information safely
  4. is free for student, teacher, and personal use
  5. to plan, direct, or plot the path or position of (a ship, an aircraft, etc)
  6. the ability of students to use digital technology, communication tools and/or networks appropriately to solve information problems to function in an information society
  7. a portable computer that is small enough to use on one's lap
  8. a free photo and video sharing app
  9. the action of working with someone to produce or create something.
  10. a group of data that collectively carries a logical meaning.
  11. It is the use of electronic means, such as instant messaging, social media, e-mail and other forms of online communication with the intent to abuse, intimidate, oroverpower an individual or group
  12. is the intellectually disciplined process of actively and skillfully conceptualizing, applying, analyzing
  13. a style of shoe with a very thick sole that is equally or almost equally thick at the front and back, so the foot is almost flat inside
  14. refers to reading and writing abilities
  15. a string of characters used to verify the identity of a user during the authentication process
  16. is the ability to discover, evaluate, and use information and technology effectively and ethically.
  17. defined as the capacity to use computer technology successfully
  18. the ability to read, write and create visual images.
  19. show that technology and its use can improve intructional practices
  20. available on or performed using the internet or other computer network
  21. a device or implement, especially one held in the hand, used to carry out a particular function.
  22. ability to access, manage, understand, integrate, communicate, evaluate and create information
  23. learning facilitated by technology that gives students some element of control over time, place, path and/or pace.
  24. ability and capacity acquired through deliberate, systematic, and sustained effort
  25. a representation of a person's real self, online.
  26. Various websites on the Internet contain material that maydeem offensive, distasteful or explicit
  27. a theory by Gregory Ulmer that describes the skills necessary to exploit the full communicative potential of a new electronic media
  28. It is a common type of scam, of which the scammers disguise as a trustworthysource in an attempt to obtain private information,
  29. a piece of writing, image, or other item of content published online, typically on a blog or on social media.
Down
  1. a short burst of inconsequential information and chirps from birds
  2. Just like physical documents are so arranged that they can be easily findable, digital file management is the cornerstone of order in a virtual environment.
  3. means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
  4. Mastery of web-surfing is like finding treasures in the enormous ocean
  5. is defined as the knowledge and ability to use computers and related technology efficiently
  6. relating to, or utilizing devices constructed or working by the methods or principles of electronics
  7. A term coined by Howard Rheingold to describe the digital literacy skills of managing the technology we use and synthesizing the information we find online.
  8. a device that uses either a system of wires along which electrical signals are sent or a system of radio signals
  9. the action of taking part in something.
  10. the state of being comfortable, healthy, or happy
  11. facts provided or learned about something or someone.
  12. the application of scientific knowledge for practical purposes,
  13. a social networking site that makes it easy for you to connect and share with family and friends online.
  14. an award-winning education technology platform that makes it easy to augment images, videos, and virtual tours with additional information and links.
  15. Communication defines the traditional classrooms
  16. a type of malicious software, or malware, that spreads between computers and causes damage to data and software.
  17. It is a malicious software (particularly spyware) disguised to collect and transmitprivate information,
  18. It is the act of engaging an underage minor into appropriate sexualrelationships through the Internet
  19. It is the use of the Internet or other electronic means to stalk or harass anindividual
  20. the use and application of technology and digital tools in international development
  21. upload a video of (someone or something)
  22. absolutely necessary or important; essential.
  23. it incorporates a lot more.

52 Clues: it incorporates a lot more.a free photo and video sharing appthe action of taking part in something.refers to reading and writing abilitiesupload a video of (someone or something)absolutely necessary or important; essential.is free for student, teacher, and personal useCommunication defines the traditional classrooms...

CyberSecurity Awareness - Cyber Knowledge 2024-09-24

CyberSecurity Awareness - Cyber Knowledge crossword puzzle
Across
  1. is a cybersecurity threat in which attackers use QR codes to redirect victims to malicious websites or prompt them to download harmful content.
  2. email that is not wanted, email that is sent to large numbers of people and that consists mostly of advertising
  3. a weakness that can be accidentally triggered or intentionally exploited
  4. a software update inserted (or patched) into the code of an executable program that fixes bugs, installs new drivers
  5. computer software that is provided usually for free but contains advertisements
  6. a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data.
  7. a program that is designed to harm a computer by deleting data,
  8. a string of words and characters that you type in to authenticate yourself
  9. preventive cybersecurity action
  10. a scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicitly
  11. A tailgating attack is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
  12. a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action
Down
  1. the act of obtaining or attempting to obtain sensitive information by manipulating an individual into revealing secure information
  2. measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
  3. having or showing realization, perception, or knowledge
  4. Employs deceptive text messages (SMS) to lure victims into sharing personal information or clicking malicious links.
  5. software designed to interfere with a computer's normal functioning
  6. computer software that secretly records information about the way you use your computer
  7. a potential circumstance, entity or event capable of exploiting a vulnerability and causing harm
  8. a secret series of numbers or letters that allows you to use a computer system
  9. Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect mean

21 Clues: preventive cybersecurity actionhaving or showing realization, perception, or knowledgea program that is designed to harm a computer by deleting data,software designed to interfere with a computer's normal functioninga weakness that can be accidentally triggered or intentionally exploited...

Cyber Physical Systems-2 2025-03-20

Cyber Physical Systems-2 crossword puzzle
Across
  1. Using data to forecast and prevent equipment failures.
  2. Self-driving cars and intelligent transportation systems.
  3. A predictable system behavior under given conditions.
  4. The delay between input and response in a system.
  5. An intelligent electricity network with automated controls.
  6. The use of technology to control industrial processes.
  7. Ensuring processes operate in a coordinated manner.
  8. The ability to continue operation despite component failures.
Down
  1. Smart healthcare devices with embedded intelligence.
  2. The creation of mathematical representations of systems.
  3. The ability of a system to function under expected conditions.
  4. The process of improving system performance.
  5. The capacity of a system to handle growth efficiently.
  6. Urban areas that integrate technology for improved efficiency.
  7. Monitoring and optimizing energy consumption.
  8. Farming with IoT and AI for better productivity.
  9. The production of goods using machines and automation.
  10. The management of materials and goods from production to delivery.
  11. Duplication of critical components to increase reliability.
  12. The capacity of a system to recover from disruptions.

20 Clues: The process of improving system performance.Monitoring and optimizing energy consumption.Farming with IoT and AI for better productivity.The delay between input and response in a system.Ensuring processes operate in a coordinated manner.Smart healthcare devices with embedded intelligence.A predictable system behavior under given conditions....

Cyber ethics and networking 2025-06-05

Cyber ethics and networking crossword puzzle
Across
  1. A secret word to access systems
  2. Always log out of ____ after use
  3. Act of pretending to be someone else online
  4. A rule that controls data transmission
  5. Software designed to protect against viruses
  6. Repeated online harassment
  7. Someone who uses tech to harm others
  8. Common wireless security protocol
  9. A global system of interconnected networks
Down
  1. Helps to convert domain names to IP address
  2. Never share your ____ with strangers
  3. Unsolicited email or messages
  4. Think before you ____ online
  5. Connecting to someone's Wi-Fi without permission
  6. Connects computers in a small area
  7. Protects private data on a network
  8. address The unique address of a device on a network
  9. Online behaviour guidelines
  10. Avoid clicking these in suspicious emails
  11. Device that forwards data pockets

20 Clues: Repeated online harassmentOnline behaviour guidelinesThink before you ____ onlineUnsolicited email or messagesA secret word to access systemsAlways log out of ____ after useCommon wireless security protocolDevice that forwards data pocketsConnects computers in a small areaProtects private data on a networkNever share your ____ with strangers...

tesdtfuf 2023-01-04

tesdtfuf crossword puzzle
Across
  1. trustworthy
  2. security
  3. reliable
Down
  1. transport
  2. loyalty
  3. competence
  4. service
  5. friendly

8 Clues: loyaltyservicefriendlysecurityreliabletransportcompetencetrustworthy

The Secret Life of Locks 2025-05-19

The Secret Life of Locks crossword puzzle
Across
  1. To open a lock
  2. Used for digital or keypad locks
  3. Simple mechanism to hold doors closed
  4. Type of lock with numbered dial
  5. Device used to secure things
  6. Opens multiple locks
Down
  1. Purpose of a lock
  2. To open a lock without a key
  3. Strong lock on doors
  4. Additional layer of door security
  5. Heavy-duty part of a lock
  6. Portable type of lock
  7. Used to open a lock
  8. Box that uses a lock for valuables

14 Clues: To open a lockPurpose of a lockUsed to open a lockStrong lock on doorsOpens multiple locksPortable type of lockHeavy-duty part of a lockTo open a lock without a keyDevice used to secure thingsType of lock with numbered dialUsed for digital or keypad locksAdditional layer of door securityBox that uses a lock for valuables...

U11 - Mod 22 Key Terms 2024-11-25

U11 - Mod 22 Key Terms crossword puzzle
Across
  1. (6,6) policy, sets out how to remotely connect to an organization’s internal network and explains what information is remotely accessible.
  2. (8) policy, this document addresses the constraints and behaviors of individuals within an organization and often specifies how data can be accessed, and what data is accessible by whom.
  3. (10,3) policy, highlights a set of rules that determine access to and use of network resources.
  4. (5) resources security, this refers to the security procedures in place that relate to employees joining, moving within, and leaving an organization.
  5. (8,8) policy, provides guidance on how to report and respond to security-related incidents within an organization.
  6. (8) policy, defines minimum password requirements.
  7. (10) policy, enforces the rules for composing credentials.
Down
  1. (4,10) this is the first step in the risk management process, which determines the quantitative and qualitative value of risk related to a specific situation or threat.
  2. (14) and authentication policy, specifies who should be permitted access to network resources and what verification procedures are in place to facilitate this.
  3. (11,8) incident management, this describes an organization’s approach to the anticipation of and response to information security breaches.
  4. (4) policy, sets out measurable rules for processing data within an organization, such as specifying where data is stored, how data is classified, and how data is handled and disposed of.
  5. (5,10) this is an inventory of and classification scheme for information assets within an organization.
  6. (14) policy, provides guidance for how work should be carried out in an organization.
  7. (7) maintenance policy, outlines procedures for updating an organization’s specified operating systems and end-user applications.

14 Clues: (8) policy, defines minimum password requirements.(10) policy, enforces the rules for composing credentials.(14) policy, provides guidance for how work should be carried out in an organization.(10,3) policy, highlights a set of rules that determine access to and use of network resources....

Crimes 2016-09-19

Crimes crossword puzzle
Across
  1. Crime A crime done in dislike of a certain race, religion, orientation
  2. Starting a harmful fire
  3. Pretending to be someone else
  4. Hurting someone
  5. Crime A crime that is committed online
Down
  1. Threatening or physically harming someone
  2. Lying under oath
  3. Forcefully taking something from someone

8 Clues: Hurting someoneLying under oathStarting a harmful firePretending to be someone elseCrime A crime that is committed onlineForcefully taking something from someoneThreatening or physically harming someoneCrime A crime done in dislike of a certain race, religion, orientation

bullying 2023-11-28

bullying crossword puzzle
Across
  1. bullying An when you bully someone on ticktock,you tube
  2. bullying An hurting someones feelings
  3. games
  4. An when you hurt someone.
Down
  1. An you listen to people with ______.
  2. An saying rude things
  3. An talking when someone else is talking.
  4. An hurting with your feet.

8 Clues: gamesAn saying rude thingsAn when you hurt someone.An hurting with your feet.An you listen to people with ______.bullying An hurting someones feelingsAn talking when someone else is talking.bullying An when you bully someone on ticktock,you tube

Hacker 2013-02-05

Hacker crossword puzzle
Across
  1. The art and science of cracking the phone network
  2. Products announced far in advance of any release.
  3. A malicious, security-breaking program that is disguised as something benign
Down
  1. Someone who accesses a computer system by circumventing its security system
  2. Code with a complex and tangled control structure
  3. A person whoknows how a complex piece of software or hardware works
  4. Individual hired to break into places in order to test their security
  5. A hole deliberately left in place by designers or maintainers
  6. One who breaks security on a system

9 Clues: One who breaks security on a systemCode with a complex and tangled control structureThe art and science of cracking the phone networkProducts announced far in advance of any release.A hole deliberately left in place by designers or maintainersA person whoknows how a complex piece of software or hardware works...

chapter 4 vocab 2017-02-21

chapter 4 vocab crossword puzzle
Across
  1. to pass through
  2. luggage
  3. to board
  4. to leave
  5. identification
  6. round tripticket
  7. monotor
  8. to travel
  9. suitcase
Down
  1. to take
  2. flight
  3. taxi
  4. passport
  5. departure
  6. gate
  7. security
  8. pilot
  9. itnerary
  10. arrival
  11. customs

20 Clues: taxigatepilotflightto takeluggagearrivalmonotorcustomspassportsecurityto boardto leaveitnerarysuitcasedepartureto travelidentificationto pass throughround tripticket

3a 2018-02-28

3a crossword puzzle
Across
  1. masszázs
  2. rémálom
  3. beszáll (repülőbe)
  4. kezelés
  5. nagykövet
  6. üzlet
  7. tucat
  8. golfpálya (4,6)
  9. létesítmény
  10. legalább (2,5)
  11. ingyenes
Down
  1. utas
  2. érzék
  3. városnézés
  4. benti
  5. paradicsom
  6. ülés
  7. békésen
  8. biztonság(i ellenőrzés)
  9. fogorvos
  10. szolgáltatás

21 Clues: utasülésérzékbentiüzlettucatrémálomkezelésbékésenmasszázsfogorvosingyenesnagykövetvárosnézésparadicsomlétesítményszolgáltatáslegalább (2,5)golfpálya (4,6)beszáll (repülőbe)biztonság(i ellenőrzés)

EnglishMaster? 2021-03-11

EnglishMaster? crossword puzzle
Across
  1. "auch gepostet"
  2. Langes Auto
  3. Lauffeuer
  4. "schneiden"
  5. Staffel
  6. Power
  7. Atmosphäre
  8. Mikro
  9. Klima
  10. Lagerfeuer
Down
  1. Very importen person
  2. sonnig
  3. Emotion
  4. Feuerwehrmann
  5. "Wache"
  6. klopfen
  7. programm
  8. gegenüber
  9. Heli
  10. neutral
  11. Flamme

21 Clues: HeliPowerMikroKlimasonnigFlammeEmotion"Wache"klopfenStaffelneutralprogrammLauffeuergegenüberAtmosphäreLagerfeuerLanges Auto"schneiden"Feuerwehrmann"auch gepostet"Very importen person

cyber bullying 2019-07-11

cyber bullying crossword puzzle
Across
  1. whats the robot thing in doctor who called?
  2. its rain clouds as an emotion
  3. like someone poking you repeatedly
  4. eminiem song
Down
  1. its not nice
  2. part of a yanderes job
  3. spooky mask bois

7 Clues: its not niceeminiem songspooky mask boispart of a yanderes jobits rain clouds as an emotionlike someone poking you repeatedlywhats the robot thing in doctor who called?

Teka teki silang keamanan jaringan 2025-11-28

Teka teki silang keamanan jaringan crossword puzzle
Across
  1. Prinsip keamanan siber yang memastikan sumber daya jaringan dan data dapat diakses secara andal saat dibutuhkan.
  2. SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.
  3. Sebuah program berbahaya yang dirancang untuk menyusup ke dalam sistem atau jaringan untuk merusak atau mencuri data.
  4. FORCE Ancaman di mana penyerang berusaha menebak kata sandi dengan mencoba semua kemungkinan kombinasi karakter secara sistematis.
  5. (MITM) Sebuah metode serangan siber di mana penyerang mencoba untuk menyadap komunikasi antara dua pihak tanpa terdeteksi.
  6. Serangan siber di mana penyerang menyamar sebagai pihak tepercaya melalui komunikasi elektronik, seperti email.
  7. OF SERVICE (DOS)
  8. ancaman yang bertujuan untuk membuat suatu layanan jaringan tidak dapat diakses oleh pengguna yang sah.
  9. Metode keamanan yang membatasi akses terhadap data dan sumber daya jaringan berdasarkan otorisasi yang sah.
  10. Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal.
  11. OVERFLOW Ancaman keamanan data yang terjadi ketika sebuah program menerima input data yang ukurannya melebihi kapasitas buffer penyimpanannya, sehingga menyebabkan kesalahan pada program dan bisa dieksploitasi oleh penyerang.
Down
  1. FILTERING Teknik untuk mencegah atau mendeteksi upaya akses data yang tidak sah atau mencurigakan ke dalam sebuah jaringan.
  2. Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.
  3. SECURITY Jenis keamanan yang berfokus pada perlindungan data selama transmisi melalui jaringan nirkabel, seperti Wi-Fi.
  4. Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.
  5. SECURITY Jenis keamanan yang berfokus pada melindungi aplikasi dari kerentanan dan serangan.
  6. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.
  7. BOMB Istilah lain untuk malware yang menyusup ke dalam sistem dan menunggu kondisi tertentu untuk aktif.
  8. SECURITY Jenis keamanan yang berfokus pada perlindungan perangkat akhir atau perangkat yang terhubung ke jaringan.
  9. Prinsip keamanan siber yang memastikan data tetap akurat dan konsisten, tidak diubah oleh pihak yang tidak berwenang.
  10. OF SERVICE (DOS) Serangan siber yang dirancang untuk menghentikan lalu lintas jaringan dengan membanjiri sistem atau jaringan dengan lalu lintas data yang berlebihan.
  11. OVERFLOW Peringatan bahwa ada sesuatu yang salah dengan kode, di mana program mengakses dan memanipulasi data dari buffer di memori, ini adalah salah satu serangan yang mengeksploitasi celah keamanan.

22 Clues: OF SERVICE (DOS)Jenis ancaman keamanan yang meminta tebusan atas data yang dienkripsi.SECURITY Jenis keamanan yang melindungi email dari spam, phishing, dan malware.Prinsip keamanan siber yang memastikan data tidak diakses oleh pihak yang tidak berwenang.Lapisan pertahanan yang memfilter lalu lintas data antara jaringan internal dan eksternal....

FOCUS ON IELTS/ UNIT 2 2014-02-10

FOCUS ON IELTS/ UNIT 2 crossword puzzle
Across
  1. increase
  2. intake
  3. suitable
  4. persistent
  5. copy
  6. harvest
  7. oppose
Down
  1. stress
  2. huge
  3. addiction
  4. attractive
  5. quickly
  6. security
  7. distribute
  8. energy
  9. research

16 Clues: hugecopystressintakeenergyopposequicklyharvestincreasesuitablesecurityresearchaddictionattractivepersistentdistribute

wilko 2015-02-17

wilko crossword puzzle
Across
  1. how old Tom is on his big birthday
  2. toms pastime at break
  3. what Tom carries on shop floor
  4. security device used in store
  5. toms car
  6. toms old force
  7. toms boss
  8. toms version of 50 shades
  9. toms wife
  10. toms favourite wind up merchant
  11. picture of suspect
Down
  1. date of toms birthday
  2. what Tom does to shoplifters
  3. what's in toms black folders
  4. toms old car
  5. toms former job
  6. what Tom calls a shoplifters
  7. guard toms job
  8. recorded evidence
  9. toms Mon morning job
  10. toms home town
  11. month of toms birthday
  12. what Tom does in the warehouse
  13. toms old boss
  14. toms son
  15. toms daughter
  16. toms favourite word

27 Clues: toms cartoms sontoms bosstoms wifetoms old cartoms old bosstoms daughterguard toms jobtoms home towntoms old forcetoms former jobrecorded evidencepicture of suspecttoms favourite wordtoms Mon morning jobdate of toms birthdaytoms pastime at breakmonth of toms birthdaytoms version of 50 shadeswhat Tom does to shoplifterswhat's in toms black folders...

Tema 2 2021-10-07

Tema 2 crossword puzzle
Across
  1. displaced
  2. worldpopulation
  3. totackle,toboard
  4. countriesoftheworld
  5. citizenship/thecitizens
  6. totry,attempt
  7. towork,haveajob
  8. flow
  9. (in)security;(lackof)security
  10. approach,pointofview,focus
  11. famoso,famous
  12. movement,motion
  13. toattain/tobeableto
  14. immigrants-lapersonaquesaledesulugardeorigenparallegaraundestinodiferente
  15. laadministracion,management
  16. willexist
  17. restart
  18. analyze,examine
  19. foreigner,alien
  20. worldwide
  21. AfricanStudiesGroup
  22. immigrationaccionyefectodeinmigar
Down
  1. immigrantswithinone'sowncountry
  2. tolink,toconnect
  3. federation
  4. toemigrate(leaveacountry)
  5. ignorance,lackofawareness
  6. population
  7. fromthesouth
  8. toexchange,totrade
  9. wewillhave(futuretenseoftener)
  10. legal
  11. knowledge,understanding
  12. Ibelievethat
  13. ignition,on
  14. totrackdown
  15. country,nation
  16. visa(traveldocument)
  17. tobrake,stop
  18. development,growth,progress
  19. reason
  20. totravel,journey
  21. continent,mainland
  22. terrorist(male)
  23. workingday; day'sjourney
  24. toreach,achieve
  25. toimmigrate(enteracountry)
  26. inside,in
  27. phenomenon

49 Clues: flowlegalreasonrestartdisplacedwillexistinside,inworldwidefederationpopulationphenomenonignition,ontotrackdownfromthesouthIbelievethattobrake,stoptotry,attemptfamoso,famouscountry,nationworldpopulationtowork,haveajobmovement,motionterrorist(male)toreach,achieveanalyze,examineforeigner,alientolink,toconnecttotackle,toboardtotravel,journey...

juuadvsuu8vu8jju8 news week 6 jndfsjdijd 2025-01-08

juuadvsuu8vu8jju8 news week 6 jndfsjdijd crossword puzzle
Across
  1. Water gets infested with oil after boat incident
  2. Wisconsion School Shooting
  3. what killed a Russian general
  4. on alert for snow and ice
  5. Canadian prime minister announces resignation
  6. D.C. boosts security after attack, how many did they add
  7. New launches new offensive in Russia
  8. Deadly winter storm sweeps across the country as millions face Arctic outbreak
  9. Attacked people on new years
  10. what happened on Dec17, 2024
  11. Congrestion takes effect in NYC
Down
  1. Got attacked by Ukraine
  2. Charging people for driving
  3. how many flights have been canceled or delayed
  4. Suspect traveled to new orleans
  5. Faced security warnings years before attack
  6. E-Bike incident
  7. Wrestled to the ground by cops
  8. Who died [39th president]
  9. On strike at mountain resort

20 Clues: E-Bike incidentGot attacked by Ukraineon alert for snow and iceWho died [39th president]Wisconsion School ShootingCharging people for drivingOn strike at mountain resortAttacked people on new yearswhat happened on Dec17, 2024what killed a Russian generalWrestled to the ground by copsSuspect traveled to new orleansCongrestion takes effect in NYC...

CPNI 2025-04-29

CPNI crossword puzzle
Across
  1. Unauthorized access or disclosure of CPNI.
  2. Security measure for account access.
  3. Ability to view or use data.
  4. Right to control personal information.
  5. Customer declines to share CPNI externally.
  6. Information collected about customers.
  7. Employee education on CPNI rules.
  8. Sharing information with others.
  9. Regulates telecom privacy, including CPNI rules.
  10. Confirming identity before disclosing CPNI.
  11. Action taken for non-compliance.
  12. Breach of CPNI rules or policies.
Down
  1. Measures to safeguard customer data.
  2. Customer permission to use or share CPNI.
  3. Protections for preventing data leaks.
  4. Rules for handling CPNI properly.
  5. Customer agrees to share CPNI with others.
  6. Customer service profile or record.
  7. Information kept private and protected.
  8. Customer data collected by telecoms about service usage.

20 Clues: Ability to view or use data.Sharing information with others.Action taken for non-compliance.Rules for handling CPNI properly.Employee education on CPNI rules.Breach of CPNI rules or policies.Customer service profile or record.Measures to safeguard customer data.Security measure for account access.Protections for preventing data leaks....

ai 2025-01-22

ai crossword puzzle
Across
  1. : Unfair favoritism in AI decisions.
  2. : Monitoring for security or control.
  3. : The natural world affected by AI.
  4. : Information used by AI.
  5. : The ability to act independently.
  6. : Something made by humans, not natural.
  7. : The ability of a machine to think like a human.
  8. : Introducing something new.
  9. : The science of designing robots.
  10. : Relying too much on something.
Down
  1. : Studying data to draw conclusions.
  2. : The process of acquiring knowledge or skills.
  3. : Identifying something or someone.
  4. : Keeping personal information safe.
  5. : A set of rules for solving a problem (AI-related).
  6. : Using imagination to create something new.
  7. : Completing tasks with minimal waste.
  8. : Protecting against threats or harm.
  9. : Using machines to perform tasks automatically.
  10. : The application of scientific knowledge.

20 Clues: : Information used by AI.: Introducing something new.: Relying too much on something.: The science of designing robots.: Identifying something or someone.: The natural world affected by AI.: The ability to act independently.: Unfair favoritism in AI decisions.: Studying data to draw conclusions.: Keeping personal information safe....

Genius Grid - III 2025-02-19

Genius Grid - III crossword puzzle
Across
  1. Component of an air handling unit (AHU) responsible for filtering airborne particles
  2. The front line of defense in information security
  3. Honeywell deploy _____sensors for real-time data collection in smart cities.
  4. The Iconic site for our HBS, In this Arabian city, I'm named after a flower yet stand taller than all. What am I?
  5. Puts out fire with chemicals
  6. Danger or risk
  7. Recent acqusition portfolio of honeywell for security GBE
Down
  1. In the context of BMS, EMS stands for ______ management systems
  2. Device used to store current and also It acts as filter
  3. Freedom from danger
  4. VDGS Stands for Visual _____ Guidance System
  5. ______city in the USA has partnered with Honeywell to implement smart city technologies aimed at improving public safety and energy efficiency? This city gave birth to wotld's most famous soda drink.
  6. _________ Infrared Sensor (PIR)
  7. Heat, light, and flames produced by burning
  8. BEATS portfolio includes Niagara, Alerton P&S and _______ brands
  9. a digital security measure

16 Clues: Danger or riskFreedom from dangera digital security measurePuts out fire with chemicals_________ Infrared Sensor (PIR)Heat, light, and flames produced by burningVDGS Stands for Visual _____ Guidance SystemThe front line of defense in information securityDevice used to store current and also It acts as filter...

Key terms for Taxes 2024-12-02

Key terms for Taxes crossword puzzle
Across
  1. Deduction A flat amount subtracted from taxable income.
  2. Pay Compensation for hours worked over 40 in a week, calculated at 1.5 times the regular hourly rate.
  3. Gains Profit earned from selling investment assets.
  4. Contractor An individual working independently without employee benefits.
  5. Benefits Employment benefits required by law, such as Social Security and Medicare.
  6. Benefits Employer-provided perks like health insurance or retirement plans.
  7. Donations Tax-deductible contributions made to qualified nonprofits.
Down
  1. Security A federal program providing income for retirees and disabled individuals.
  2. Deductions Expenses that reduce taxable income when listed individually.
  3. A health insurance program for those aged 65 or older.
  4. Tax funding Social Security and Medicare programs.
  5. Gross Income (AGI) Income after allowable deductions, used to calculate taxes.
  6. Wage The lowest hourly wage allowed by law.
  7. Tax Taxes withheld from an employee’s paycheck for FICA and income tax.
  8. Brackets Income ranges taxed at progressively higher rates.
  9. Loss: Deductible property damage from federally declared disasters.

16 Clues: Wage The lowest hourly wage allowed by law.Tax funding Social Security and Medicare programs.Gains Profit earned from selling investment assets.A health insurance program for those aged 65 or older.Deduction A flat amount subtracted from taxable income.Brackets Income ranges taxed at progressively higher rates....

Gefahren im Internet 2022-04-25

Gefahren im Internet crossword puzzle
Across
  1. bist du ein...?
  2. wie nennt man beleidigungen auf digitaler ebene
Down
  1. was bedeutet hate massages auf deutsch?
  2. wo finde meistens cyber-mobbing statt?

4 Clues: bist du ein...?wo finde meistens cyber-mobbing statt?was bedeutet hate massages auf deutsch?wie nennt man beleidigungen auf digitaler ebene

boilermaking mehdi 2023-04-03

boilermaking mehdi crossword puzzle
Across
  1. security for foot
  2. we can cut metal sheet
  3. with this we can hit nails
  4. with this we can stick 2 metal parts
  5. is fer + carbon
Down
  1. security for hands
  2. security for head
  3. with this we can screw

8 Clues: is fer + carbonsecurity for headsecurity for footsecurity for handswith this we can screwwe can cut metal sheetwith this we can hit nailswith this we can stick 2 metal parts

technology 2023-11-06

technology crossword puzzle
Across
  1. used to see better
  2. used to type better
  3. is in the mediaverse
  4. used to make device work
  5. used to plug in things
  6. are used to not have sound loud
  7. you use it alot in school
  8. energy used for energy from sun
Down
  1. used to talk to people online
  2. is used for all thing to work
  3. there are thousands of them in technology
  4. used to keep electronic alive
  5. used to watch and play things on device
  6. type of car but different and new
  7. used to help instead of the computer mouse

15 Clues: used to see betterused to type betteris in the mediaverseused to plug in thingsused to make device workyou use it alot in schoolused to talk to people onlineis used for all thing to workused to keep electronic aliveare used to not have sound loudenergy used for energy from suntype of car but different and newused to watch and play things on device...

Cyber Awareness Puzzle 2022-10-13

Cyber Awareness Puzzle crossword puzzle
Across
  1. When raw data is put into context and has meaning, the data transforms into ...
  2. A type of malware that records every single press of the keyboard that you make.
  3. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known.
  4. The IT ... 2000 is the law used to prosecute cybercrime in India
  5. link designed to steal personal information.
  6. Settings on folders or files that control who is allowed to access them.
Down
  1. I am not a robot.
  2. ... authentication requires an additional method of checking that it is really you trying to interface with another system (two words).
  3. Gaining unauthorised access to or control of a computer system.
  4. Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
  5. Malicious code intended to monitor your activity without your permission.
  6. An email that contains a message with a
  7. A malicious code typically disguised as a legitimate program.

13 Clues: I am not a robot.An email that contains a message with alink designed to steal personal information.A malicious code typically disguised as a legitimate program.Gaining unauthorised access to or control of a computer system.The IT ... 2000 is the law used to prosecute cybercrime in India...

Bully 2021-06-25

Bully crossword puzzle
Across
  1. a person that does something bad over and over
  2. a feeling that is tied to the colour blue
  3. a feeling that also is tied to the colour red
  4. a bad thing people do
  5. a mind thing
Down
  1. a short term for technology
  2. not good
  3. when they punch or push you
  4. a feeling that also is tied to the colour blue
  5. worry
  6. a feeling that is tied to the colour red

11 Clues: worrynot gooda mind thinga bad thing people doa short term for technologywhen they punch or push youa feeling that is tied to the colour reda feeling that is tied to the colour bluea feeling that also is tied to the colour reda person that does something bad over and overa feeling that also is tied to the colour blue

ΚΟΙΝΩΝΙΚΑ ΔΙΚΤΥΑ 2023-04-26

ΚΟΙΝΩΝΙΚΑ ΔΙΚΤΥΑ crossword puzzle
Across
  1. Πιο είναι το πιο διαδεδομένο μέσο κοινωνικής δικτύωσης.
  2. Τείχος προστασίας.
  3. Κακόβουλο πρόγραμμα.
  4. Όταν κάποιος υποδύεται μία αξιόπιστη οντότητα ώστε να αποστήση τα προσωπικά του δεδομένα.
  5. Περιέχει προσωπικές μας πληροφορίες.
  6. ανεπιθύμητα μηνύματα.
Down
  1. Κακόβουλη χρήστες που στοχοποιούν και παρενοχλούν άλλους.(2 λέξεις)
  2. Συμπεριφορά που χαρακτηρίζεται απο εξάρτηση σε μια συγκεκριμένη δραστηριότητα.
  3. Δυνατότητα κοινωνικής συναναστροφής με άλλα άτομα.
  4. Βλαβερό πρόγραμμα που ανπαράγεται δημιούργοντας αντίγραφα του εαυτού του.
  5. Λογισμικό προστασίας από ιούς.

11 Clues: Τείχος προστασίας.Κακόβουλο πρόγραμμα.ανεπιθύμητα μηνύματα.Λογισμικό προστασίας από ιούς.Περιέχει προσωπικές μας πληροφορίες.Δυνατότητα κοινωνικής συναναστροφής με άλλα άτομα.Πιο είναι το πιο διαδεδομένο μέσο κοινωνικής δικτύωσης.Κακόβουλη χρήστες που στοχοποιούν και παρενοχλούν άλλους.(2 λέξεις)...

Cyber Extortion crossword 2024-04-08

Cyber Extortion crossword crossword puzzle
Across
  1. ______ extortion is extortion of money online.
  2. Demand for payment in exchange for stolen data.
  3. Abbreviation of Distribution Denial of Service.
  4. _________ of service.
  5. Distribution Denial of Service DDoS affects.
  6. Opposite of encryption.
Down
  1. A threat to release sexually images, videos unless a ransom is paid.
  2. A method used by extortionists to convey demands.
  3. A victim maybe _____ out of basic computer functions.
  4. Extortionists use this to encrypting files or lock systems.
  5. You should never ______ ransom.

11 Clues: _________ of service.Opposite of encryption.You should never ______ ransom.Distribution Denial of Service DDoS affects.______ extortion is extortion of money online.Demand for payment in exchange for stolen data.Abbreviation of Distribution Denial of Service.A method used by extortionists to convey demands....

REDEMPTION CW 2023-07-27

REDEMPTION CW crossword puzzle
Across
  1. Evicted against vincent
  2. evicted first
  3. Evicted in the first 3-1 vote
  4. evicted in the triple eviction
  5. was the first COHOH of the season
  6. evicted in the triple eviction
Down
  1. An HOH competition Jenn won!
  2. Evicted in a triple eviction
  3. the goal of the entire season! You want to be this!
  4. the name of the host of the Longterm
  5. evicted in a triple eviction

11 Clues: evicted firstEvicted against vincentAn HOH competition Jenn won!Evicted in a triple evictionevicted in a triple evictionEvicted in the first 3-1 voteevicted in the triple evictionevicted in the triple evictionwas the first COHOH of the seasonthe name of the host of the Longtermthe goal of the entire season! You want to be this!

The Bois Minecraft server 2023-05-01

The Bois Minecraft server crossword puzzle
Across
  1. the max amount of data
  2. online security safety
  3. A group of people all connected to one what?
  4. studies properties of spaces
  5. LAN
  6. big boss of internet
Down
  1. security regulations
  2. a person or organization using the services of a lawyer or other professional person or company.
  3. one group server access
  4. a very safe way to stop viruses
  5. your online adress
  6. Thing you put USB into
  7. Interconnected devices

13 Clues: LANyour online adresssecurity regulationsbig boss of internetthe max amount of dataonline security safetyThing you put USB intoInterconnected devicesone group server accessstudies properties of spacesa very safe way to stop virusesA group of people all connected to one what?...

Mon 20 March DOGS 2023-03-20

Mon 20 March DOGS crossword puzzle
Across
  1. Creative groomers dream
  2. The best for cheaper vets bills
  3. Roman fine boned runner
  4. Mills needed these
  5. Teutonic sheep keepers
Down
  1. Good pullers in packs
  2. Security called they want their dog back
  3. See Security
  4. Dog with bad PR
  5. Will eat anything
  6. Long everywhere apart from legs

11 Clues: See SecurityDog with bad PRWill eat anythingMills needed theseGood pullers in packsTeutonic sheep keepersCreative groomers dreamRoman fine boned runnerLong everywhere apart from legsThe best for cheaper vets billsSecurity called they want their dog back

Vocabulario #6 (es2) - write translations! 2022-10-31

Vocabulario #6 (es2) - write translations! crossword puzzle
Across
  1. – window
  2. – departure
  3. – Cancelled
  4. – counter
  5. – backpack
  6. – Passport
  7. – flight
  8. – aisle
Down
  1. – passenger
  2. – trip
  3. – seat
  4. – pilot
  5. – security
  6. - delayed
  7. – to travel
  8. – luggage

16 Clues: – trip– seat– pilot– aisle– window– flight– counter- delayed– luggage– security– backpack– Passport– passenger– departure– Cancelled– to travel

CH2 Vocab 3H 2021-11-19

CH2 Vocab 3H crossword puzzle
Across
  1. kapen
  2. verdeling, distributie
  3. gejaagd, hectisch
  4. rechtzaak
  5. rijkdom
  6. verbeteren
  7. busje
  8. krantenkop
  9. buitenwijk
Down
  1. investering, belegging
  2. beveiliging
  3. ontrafelen
  4. voertuig
  5. aankunnen
  6. misdeeld, verstoken
  7. ontwikkelen
  8. volgen, opsporen
  9. custody in hechtenis
  10. terugkrijgen

19 Clues: kapenbusjerijkdomvoertuigaankunnenrechtzaakontrafelenverbeterenkrantenkopbuitenwijkbeveiligingontwikkelenterugkrijgenvolgen, opsporengejaagd, hectischmisdeeld, verstokencustody in hechtenisinvestering, beleggingverdeling, distributie

Focus unit 1 2023-11-14

Focus unit 1 crossword puzzle
Across
  1. - אי
  2. - לא רגיל
  3. - פריט
  4. - בטוח
  5. - להעמיד פנים
  6. - מתנה
  7. - בית מלון
  8. - מטוס
  9. guard - מאבטח
Down
  1. - לדחוף
  2. sale - במבצע
  3. - שדי תעופה
  4. - במשך
  5. - דרכון
  6. - דעה
  7. - עיתון
  8. - ריצפה, קומה
  9. - עגלה
  10. - סיבה

19 Clues: - אי- דעה- במשך- פריט- בטוח- מתנה- עגלה- מטוס- סיבה- לדחוף- דרכון- עיתון- לא רגיל- בית מלון- שדי תעופהsale - במבצע- להעמיד פנים- ריצפה, קומהguard - מאבטח

Cyber Security Awareness Month Week 3 2021-10-22

Cyber Security Awareness Month Week 3 crossword puzzle
Across
  1. Setup a ______ network with strong password for smart devices to limit the damage of a cyberattack on your home network.
  2. ________is a network security device or software, that monitors and block specific traffic based on a defined set of security rules.
  3. _______ engineering is a psychological manipulation technique that tricks users into giving away sensitive information
Down
  1. Think before you click on _______ or links in any emails
  2. ___ is an authentication method that requires the user to provide two or more verification factors to gain access.
  3. Using a trusted ________ manager can help keep your passwords organized and secured.

6 Clues: Think before you click on _______ or links in any emailsUsing a trusted ________ manager can help keep your passwords organized and secured.___ is an authentication method that requires the user to provide two or more verification factors to gain access....

ONLINE SAFETY CROSSWORD 2013-01-31

ONLINE SAFETY CROSSWORD crossword puzzle
Across
  1. If you find something inappropriate, ____ it.
  2. Another word for the internet
  3. Keep all of your information ______
  4. Computers are often open to _____
  5. If anything happens online, tell an ______
  6. Do not send on _________ to your friends
Down
  1. Only let your ______ see your personal information
  2. Rarely any free offers that come up online are actually ____
  3. The age you must be to go on YouTube
  4. Many online offers are _____

10 Clues: Many online offers are _____Another word for the internetComputers are often open to _____Keep all of your information ______The age you must be to go on YouTubeDo not send on _________ to your friendsIf anything happens online, tell an ______If you find something inappropriate, ____ it.Only let your ______ see your personal information...

Futuristic cities 2024-06-28

Futuristic cities crossword puzzle
Across
  1. - Bright, glowing lights often used in signs.
  2. - To move instantly from one place to another.
  3. - A place where spacecraft are launched and landed.
  4. - A machine that can perform tasks automatically.
  5. - A 3D image created with lasers.
Down
  1. - A very tall building.
  2. - A vehicle that floats above the ground.
  3. - A robot that looks like a human.
  4. - Relating to computers or technology.
  5. - An unmanned aerial vehicle.

10 Clues: - A very tall building.- An unmanned aerial vehicle.- A 3D image created with lasers.- A robot that looks like a human.- Relating to computers or technology.- A vehicle that floats above the ground.- Bright, glowing lights often used in signs.- To move instantly from one place to another.- A machine that can perform tasks automatically....

The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons 2023-05-04

The Thrilling Puzzle Climax Of K Collin's Computer Science Lessons crossword puzzle
Across
  1. what car manufacturer made the first modern driverless car
  2. data should not be kept longer than
  3. who is exempt from the data protection act
  4. all personal data should be kept
  5. the owner of the data
Down
  1. the DPA has 8
  2. police, government and taxers all all ______ from the DPA
  3. a form of cyber-bullying
  4. data must be routinely for maximum protection
  5. data should be used

10 Clues: the DPA has 8data should be usedthe owner of the dataa form of cyber-bullyingall personal data should be keptdata should not be kept longer thanwho is exempt from the data protection actdata must be routinely for maximum protectionpolice, government and taxers all all ______ from the DPAwhat car manufacturer made the first modern driverless car

Code B 2023-12-07

Code B crossword puzzle
Across
  1. Programming language for web development
  2. Process of identifying and fixing errors in code
  3. Function that calls itself
  4. Repeating a process or set of instructions
  5. Markup language for creating web pages
Down
  1. Application Programming Interface for software communication
  2. Prefix related to computers and digital technology
  3. Graphical User Interface for user interaction
  4. Symbol indicating a specific operation in code
  5. Set of rules governing the structure of code

10 Clues: Function that calls itselfMarkup language for creating web pagesProgramming language for web developmentRepeating a process or set of instructionsSet of rules governing the structure of codeGraphical User Interface for user interactionSymbol indicating a specific operation in codeProcess of identifying and fixing errors in code...

Circle of Security 2021-03-12

Circle of Security crossword puzzle
Across
  1. When possible follow your child's __________.
  2. It is never too ______ to be a good parent.
  3. Whenever necessary, take _____________.
  4. _____________ Firmness and Affection.
  5. Change child by changing your ___________.
  6. Babies naturally seek ____________.
  7. Name callers are ____________.
  8. Children need us to be________.
Down
  1. Knowing we are loved gives us ___________.
  2. Children need us to be ______________.
  3. Security teaches a baby to feel __________.
  4. Know you can NOT be _________,and that is ok.
  5. Without knowledge children can feel________.
  6. Babysitters should be over age _____.

14 Clues: Name callers are ____________.Children need us to be________.Babies naturally seek ____________._____________ Firmness and Affection.Babysitters should be over age _____.Children need us to be ______________.Whenever necessary, take _____________.Knowing we are loved gives us ___________.Change child by changing your ___________....

Unit 2 Vocabulary: The Human Factor 2023-10-13

Unit 2 Vocabulary:  The Human Factor crossword puzzle
Across
  1. Deceptive schemes or rumors created with the intent to mislead or trick people. They are typically spread through various channels, including social media, email, or other forms of communication.
  2. A formal set of rules, guidelines, or principles established by an organization to govern its operations and decision-making. Often outline security procedures and best practices.
  3. A form of cyberattack where attackers impersonate legitimate organizations or individuals to trick recipients into revealing sensitive information like login credentials, personal details, or financial data. It's often done through deceptive emails, websites, or messages.
  4. A type of phishing that occurs through text messages or SMS. Attackers send fraudulent messages that may contain malicious links or ask for sensitive information.
  5. A tactic where an attacker manipulates individuals into approaching them for information or assistance. The attacker, in this case, positions themselves as a helpful resource to extract information or gain access.
  6. The unauthorized access, exploration, or manipulation of computer systems, networks, or data. It can have both positive and negative connotations.
  7. Occurs when an unauthorized person gains physical access to a restricted area or building by following an authorized person without their knowledge or consent.
  8. To reduce or lessen the severity or impact of a problem or risk. It involves taking steps to minimize the potential harm from security threats or vulnerabilities.
Down
  1. A method used by individuals to manipulate, deceive, or trick people into revealing confidential information or taking actions that compromise security. It relies on psychological manipulation and often involves impersonating a trusted entity to gain unauthorized access to sensitive data or systems.
  2. A form of social engineering where the attacker creates a fabricated scenario to obtain information or gain trust. This often involves impersonating someone else, such as a co-worker, to trick individuals into divulging sensitive data.
  3. A social engineering technique that involves offering something enticing (e.g., a free download, software, or a physical device) to lure individuals into taking actions that compromise their security, such as downloading malicious software or revealing sensitive information.
  4. A detailed step-by-step process or set of actions that need to be followed to accomplish a specific task or objective. Often provide instructions on how to implement security measures or respond to security incidents.
  5. The act of spying on someone's computer screen or keypad from a close distance to obtain sensitive information, such as login credentials, PINs, or personal data, without their knowledge or consent.
  6. Refers to the practice of collecting and analyzing information from publicly available sources, such as social media, websites, and news articles, to gather intelligence about individuals, organizations, or events.
  7. Involves rummaging through trash or discarded materials, such as documents, hard drives, or electronic devices, in search of information that can be used for malicious purposes, like identity theft or data breaches.
  8. A social engineering technique that uses phone calls to deceive individuals into revealing personal or financial information. Attackers often impersonate trusted entities to gain the victim's trust.
  9. A specialized form of spear-phishing that specifically targets high-profile individuals, such as executives or senior management within an organization. The goal is to steal sensitive information or gain access to their accounts.
  10. A highly targeted form of phishing that focuses on a specific individual, organization, or department. Attackers conduct detailed research to personalize their phishing attempts, making them more convincing.
  11. A type of social engineering that relies on phone calls to deceive individuals into revealing personal or financial information.
  12. Malicious software or deceptive advertisements that exploit fear or intimidation to trick users into purchasing fake security software or taking actions that compromise their computer's security. Often displays false alerts about non-existent threats to scare users into paying for a solution.

20 Clues: A type of social engineering that relies on phone calls to deceive individuals into revealing personal or financial information.The unauthorized access, exploration, or manipulation of computer systems, networks, or data. It can have both positive and negative connotations....

IT 120 - Lesson 7 Configuring SOHO Network Security 2024-10-22

IT 120 - Lesson 7 Configuring SOHO Network Security crossword puzzle
Across
  1. phase in an attack or penetration test in which the attacker or tester gathers information about the target before attacking it
  2. biometric camera-based scanner that uses unique features of a palm shown by visible and infrared light
  3. technique of discovering things about an organization or person based on what they throw away
  4. information is accessible to those authorized to view or modify it
  5. mechanism to configure access through a firewall for application that require more than one port
  6. attack technique where the threat actor disguises their identity or impersonates another user or resource
  7. AAA protocol used to manage remote and wireless authentication infrastructures
  8. security entry system with two gateways, only one of which is open at any one time
  9. type of port forwarding where the external port is forwarded to a different internal port on the LAN
  10. home router implementation of DMZ where all ports with no existing forwarding rules are opened and directed to a single LAN host
  11. person or entity responsible for an event that has been identified as a security incident or as a risk
  12. social engineering attack where an attacker pretends to be someone they are not
  13. password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords
  14. system whose configuration is different from its secure baseline
  15. wireless access point that deceives users into believing that it is a legitimate network access point
  16. vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability
  17. weakness that could be triggered accidentally or exploited intentionally to cause a security breach
  18. security framework and tools that facilitate the use of personally-owned devices to access corporate networks and data
  19. physical intrusion detection and warning that can use circuit, motion, proximity, and duress triggers
  20. any type of physical, application, or network attack that affects the availability of a managed resource
  21. symmetric 128-, 192, or 256-bit block cipher used for bulk encryption in modern security standards
  22. tactic to obtain someone's password or PIN by observing him or her as it is typed in
  23. specific method by which malware code infects a target host, often via some vulnerability in a software process
  24. protocol framework allowing network devices to autoconfigure services
  25. authentication mechanism that allows a user to present a smartcard to operate an entry system
  26. allowing a threat actor to enter a site or controlled location without authorization
  27. security measure used to identify and block suspicious, malicious and/or inappropriate content in accordance with an organization's policies
  28. an attack that uses multiple compromised hosts to overwhelm a service with request or response traffic
  29. activity where the goal is to use deception and trickery to convince unsuspecting users to provide sensitive data or to violate security guidelines
  30. physical security control that uses cameras and recording devices to visually monitor the activity in a certain area
Down
  1. threat actor who is assigned privileges on the system that cause an intentional or unintentional incident
  2. email based attack, in which the attacker sends email from a supposedly reputable source to try to elicit private information from the victim
  3. malicious script hosted on an attacker's site or coded in a link injected onto a trusted site designed to compromise client browsing the trusted site, circumventing the browser's security model of trusted zones
  4. security barrier designed to prevent unauthorized access to a site perimeter
  5. protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
  6. data is stored and transferred as intended and any modification is authorized
  7. one or more required security controls is missing or misconfigured on a system
  8. attack where the threat actor makes an independent connection between two victims and is able to read and possible modify traffic
  9. sturdy vertical post installed to control road traffic or designed to prevent ram-raiding and vehicle-ramming attacks
  10. form of phishing which targets specific individuals
  11. cipher that uses mathematically linked public and private keys
  12. function that converts an arbitrary length string input to a fixed length string output
  13. software instructions embedded on a hardware device
  14. technique to gain access to a building by following someone who is unaware of their presence
  15. hand-held or walkthrough metal detector designed to detect concealed weapons
  16. password attack that compares encrypted passwords against a predetermined list of possible password values
  17. likelihood and impact of a threat actor exercising a vulnerability
  18. standards for authenticating and encrypting access to Wi-Fi networks
  19. process in which a router takes requests from the Internet for a particular application and sends them to a designated host on the LAN
  20. two way encryption scheme in which encryption and decryption are both performed by the same key
  21. physical security mechanisms that ensure a site is sufficiently illuminated for employees and guests to feel safe and for camera-based surveillance systems to work well
  22. attack that injects a database query into the input data directed at a server by accessing the client side of the application
  23. character string that identifies a particular wireless LAN
  24. message digest encrypted using a sender's private key that is appended to a message to authenticate the sender and prove message integrity
  25. biometric scanner based on analysis of the unique pattern of blood vessels at the back of the eye
  26. framework for negotiating authentication methods that enables systems to use hardware-based identifiers for authentication and establish secure tunnels through which to submit credentials
  27. threat actor extracts information while speaking over the phone or VoIP service
  28. any method by which cryptographic keys are transferred among users, thus enabling the use of a cryptographic algorithm
  29. certain information should only be known to certain people
  30. form of phishing which targets senior executives or wealthy individuals
  31. group of hosts or devices that have been infected by a control program called a bot that enables attacks to exploit the hosts to mount attacks
  32. physical security device that restricts access to ports and internal components to key holders
  33. segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports
  34. single sign-on authentication and authorization service that is based on a time-sensitive, ticket-granting system
  35. personal authentication mechanism for Wi-Fi networks introduced with WPA3

65 Clues: form of phishing which targets specific individualssoftware instructions embedded on a hardware devicecharacter string that identifies a particular wireless LANcertain information should only be known to certain peoplecipher that uses mathematically linked public and private keyssystem whose configuration is different from its secure baseline...

Air Force Career: Cyber Surety 2021-11-17

Air Force Career: Cyber Surety crossword puzzle
Across
  1. From programming to _____, these experts keep our systems and our information safe.
  2. Responsible for cybersecurity of national ____ systems.
  3. Minimum Education: High School ______
  4. ASVAB requirement
Down
  1. Completion of 8.5 weeks of Basic _____Training
  2. Enforce national, DoD, and Air Force security policies and _________
  3. Status: Enlisted Airmen with credits earned towards _______ Systems Technology
  4. Ensure all systems comply with ____ security standards.
  5. Training: 50 ____

9 Clues: Training: 50 ____ASVAB requirementMinimum Education: High School ______Completion of 8.5 weeks of Basic _____TrainingEnsure all systems comply with ____ security standards.Responsible for cybersecurity of national ____ systems.Enforce national, DoD, and Air Force security policies and _________...

chapter 2 2022-11-21

chapter 2 crossword puzzle
Across
  1. is a type of EFT transaction; money is deposited directly into a customer's checking acc.
  2. allow customers to pay for purchases and withdraw cash.
  3. those people who do the work
  4. are issued after the sale of stocks.
  5. is a financial institution that is involved in trading securities in financial markets.
  6. for sophisticated investors who borrow money to purchase securities.
  7. is a financial institution that does not accept deposits.
  8. is a financial investment issued by a corporation, government, or other organization.
  9. is a document guaranteeing payment of a specific amount of money.
  10. percent dividend of the stock as a percentage of stock price
  11. is a bank account used by depositors to accumulate money for future use.
  12. are largest category of deposits institutions.
  13. stock holders buy and sell shares of stock from one another with the help of brokers.
  14. selling stocks and bonds directly to public investors
Down
  1. is a financial institution that accepts money from costumers and deposits it into the customers account.
  2. is a security that pay interest over terms of ten to thirty years.
  3. need to pay for security purchases within three business days of order.
  4. are for profit businesses that sell insurance produts.
  5. is a document guaranteeing that a buyer will pay the seller the agreed upon. amount and within the time specified.
  6. is a security that pays interest over terms ranging from two to ten years.
  7. is a financial institution that offers and loan services.
  8. people who lend money to the business in return for a contracted rate of interest or return for their investment.
  9. is a security that matures in a year or less.
  10. is a financial institution that provides services for businesses.
  11. is a bank account that allows that allows the account owner to make deposits, write checks, and withdraw money.
  12. is a nonprofit financial institution that is privately owned and provides banking services for its members.
  13. people who buy shares of stock in the company
  14. is a regular payment made from customer's bank account to a vendor or supplier.
  15. is a financial institution that makes money by issuing loans; loan company.
  16. money for real estate, equipment, and so on.

30 Clues: those people who do the workare issued after the sale of stocks.money for real estate, equipment, and so on.is a security that matures in a year or less.people who buy shares of stock in the companyare largest category of deposits institutions.selling stocks and bonds directly to public investors...

Investment Unit 2024-03-20

Investment Unit crossword puzzle
Across
  1. The consequences of taking money out of your retirements account before the required age
  2. represents a loan from the buyer to the issuer
  3. federal payroll tax that is deducted from each paycheck to pay for others' social security and earns credits that you will supposedly be paid when you receive social security
  4. the 60 day period after leaving your company to move the money in your 401k into a new 401k
  5. intrest on intrest
  6. the amount of years until social security is expected to run out
  7. cash from a large group of investors to invest in stocks, bonds and other securities
  8. digital currency backed by nothing except public impression
  9. a fund where your money is diversified across multiple companies, giving you a more diverse profile
  10. the maximum amount of money you can put into the IRA per year
  11. The increase in the value of an asset
  12. in a traditional IRA, once you turn 73 you must begin taking out a minimum amount of money from the account each year
  13. animal representing a bad market
  14. a unique brief combination of letters that represents the company's stocks
  15. the number of days you have to rollover your 401k after leaving a company
Down
  1. the age you collect social security
  2. investing a small sum regularly into a fund
  3. the age you start investing
  4. the money made overtime
  5. when someone trades based on information on a company because it is announced to the public
  6. you can put in up to $7000 per year into this retirement account pre-tax but will be taxed when you take the money out
  7. a sum of money saved or made available for a particular purpose
  8. you can put in up to $7000 per year into this retirement account post-tax and will not be taxed when you take the money out
  9. animal representing a good market
  10. investing a big sum into a fund at once
  11. expected to run out in 2031
  12. expected to run out in 2033
  13. unionized workers receive this when they retire
  14. when you are guaranteed to receive 100% of the money the company you work for matched for your 401k
  15. a retirement account managed by your employer that will pay you once you retire a certain percentage of your average salary over the course of specified years
  16. a security that represents the ownership of a peice of a company

31 Clues: intrest on intrestthe money made overtimethe age you start investingexpected to run out in 2031expected to run out in 2033animal representing a bad marketanimal representing a good marketthe age you collect social securityThe increase in the value of an assetinvesting a big sum into a fund at onceinvesting a small sum regularly into a fund...

Security 2024-11-21

Security crossword puzzle
Across
  1. Large marsupial
  2. who is test user
  3. Flying mammal
Down
  1. Has a trunk
  2. Man's best friend
  3. Likes to chase mice

6 Clues: Has a trunkFlying mammalLarge marsupialwho is test userMan's best friendLikes to chase mice

Stock Market Terms Crossword 2020-05-13

Stock Market Terms Crossword crossword puzzle
Across
  1. is a period of sustained increases in the prices of stocks, bonds or indices (1wd)
  2. is a huge company with an excellent reputation. (3wd)
  3. an order an investor may place to buy or sell a security that remains active until either the order is filled or the investor cancels it (4wd)
  4. the amount by which the ask price exceeds the bid price for an asset in the market (3wd)
  5. to give/hand over in exchange for money (1wd)
  6. type of order to purchase or sell a security at a specified price or better.(2wd)
  7. the buying of a stock, commodity, or currency with the expectation that it will rise in value (2wd)
  8. an accounting method in which a cost is included in the value of an asset and expensed over the useful life of that asset, rather than being expensed in the period the cost was originally incurred (1wd)
  9. the process of offering shares of a private corporation to the public in a new stock issuance. (1wd/3wd)
  10. a marketplace where securities, commodities, derivatives and other financial instruments are traded (1wd)
  11. alternative investments using pooled funds that employ different strategies to earn active return, or alpha, for their investors (4wds)
  12. a unique series of letters assigned to a security for trading purposes(2wd)
  13. the condition of the financial market in which prices are rising or expected to rise.(2wd)
  14. a direction to a broker to execute a trade at a specific price that expires at the end of the trading day if it is not completed. (2wd)
  15. a trader who executes a large volume of short and long trades to capitalize on intraday market price action (2wd)
  16. the lowest price a shareholder is willing to part with shares (1wd)
  17. the marketplace where various national currencies are traded.(1wd)
  18. a grouping of financial assets such as stocks, bonds, commodities, currencies and cash equivalents, as well as their fund counterparts, including mutual, exchange-traded and closed funds (1wd)
Down
  1. an investing strategy in which a stock owner purchases additional shares of a previously initiated investment after the price has dropped further. (2wd)
  2. the completion of a buy or sell order for a security.(1wd)
  3. the maximum number of shares that a corporation is legally permitted to issue (2wd)
  4. the money borrowed from a brokerage firm to purchase an investment. It is the difference between the total value of securities held in an investor's account and the loan amount from the broker (1wd)
  5. a negotiable certificate issued by a U.S. depository bank representing a specified number of shares—or as little as one share—investment in a foreign company's stock(1wd/4wds)
  6. the ease with which an asset, or security, can be converted into ready cash without affecting its market price (1wd)
  7. the total quantity of shares or contracts traded for a specified security. (2wd)
  8. a widely used indicator in technical analysis that helps smooth out price action by filtering out the “noise” from random short-term price fluctuations.(2wd)
  9. a request by an investor – usually made through a broker or brokerage service – to buy or sell a security at the best available price in the current market.(2wd)
  10. an individual or firm that acts as an intermediary between an investor and a securities exchange.(1wd)
  11. the highest price an investor is willing to pay for a share (1wd)
  12. a statistical measure of the dispersion of returns for a given security or market index. (1wd)
  13. the portion of shares of a corporation that are in the hands of public investors (2wd)
  14. the last price at which a security or commodity traded, meaning the most recent price to which a buyer and seller agreed and at which some amount of the asset was transacted(1wd)
  15. to purchase/obtain in exchange for payment (1wd)
  16. an asset that tracks a particular set of equities, similar to an index.(1wd/4wds)
  17. the sale of new or closely held shares by a company that has already made an initial public offering (2wd)
  18. when a market experiences prolonged price declines (2wd)
  19. the distribution of a portion of the company's earnings, decided and managed by the company’s board of directors, and paid to a class of its shareholders.(1wd)
  20. the earnings generated and realized on an investment over a particular period of time(1wd)
  21. an area of the economy in which businesses share the same or a related product or service(1wd)
  22. a measure of the volatility, or systematic risk, of a security or portfolio, in comparison to the market as a whole (1wd)

40 Clues: to give/hand over in exchange for money (1wd)to purchase/obtain in exchange for payment (1wd)is a huge company with an excellent reputation. (3wd)when a market experiences prolonged price declines (2wd)the completion of a buy or sell order for a security.(1wd)the highest price an investor is willing to pay for a share (1wd)...

Finance 2024-03-13

Finance crossword puzzle
Across
  1. A percentage of the amount borrowed that a user of a loan must pay the lender.
  2. What's the commonly used acronym for a marketable security that tracks a stock?
  3. A number between 300 & 850 that determines a person's creditworthiness.
  4. When a person or organization owes money to someone else is called as ______.
  5. What do you call a legal entity created by an individual in which one person or institution holds the right to manage property or assets for the benefit of someone else?
  6. What is the coefficient that measures risk-adjusted performance, factoring in the risk due to the specific security, rather than the overall market?
  7. Goods or services that are required for survival but are desired are called as _______.
  8. What term is used to describe the range of price swings of a security or market over time? market over time?
  9. A way to spend money wisely by calculating net income and expenses to see what you spend your money on.
  10. What is the amount of current income provided by an investment?
Down
  1. What is the abbreviation of a type of retirement account in which contributions are deductible from earned income in the calculation of federal and state income taxes if the taxpayer meets certain requirements?
  2. What financial products value is based on an underlying security, commodity or other financial instrument?
  3. What kind of contract is standardized, transferable, and exchange-traded and requires delivery of a commodity, bond, currency, or stock index, at a specified price, on a specified future date?
  4. What do you call evidence of a debt in which the issuer promises to pay the holders of this financial product a specified amount of interest and to repay the principal at maturity?
  5. What do you call evidence of an investment, either in direct ownership (as with stocks), creditorship (as with bonds), or indirect ownership (as with options)?
  6. COST The potential loss of other alternatives due to choosing another alternative.
  7. What kind of funds does a hedge fund use to earn alpha for its investors?
  8. What is a type of trust created by a person during his or her lifetime?

18 Clues: What is the amount of current income provided by an investment?A number between 300 & 850 that determines a person's creditworthiness.What is a type of trust created by a person during his or her lifetime?What kind of funds does a hedge fund use to earn alpha for its investors?...

Introduction to Cybersecurity 2025-06-19

Introduction to Cybersecurity crossword puzzle
Across
  1. Fraudulent attempt to steal sensitive data via deceptive emails.
  2. Incident where data is accessed/stolen without permission.
  3. Three core security goals: Confidentiality, Integrity, and _______.
  4. Moral principles governing digital behavior (e.g., privacy, transparency).
Down
  1. Security system that monitors/controls network traffic (blocks unauthorized access).
  2. Self-replicating malware that spreads between devices.
  3. Process of encoding data to prevent unauthorized reading.
  4. Malicious software designed to damage systems (e.g., viruses, trojans).
  5. Person who exploits system vulnerabilities.
  6. Software update to fix security flaws.

10 Clues: Software update to fix security flaws.Person who exploits system vulnerabilities.Self-replicating malware that spreads between devices.Process of encoding data to prevent unauthorized reading.Incident where data is accessed/stolen without permission.Fraudulent attempt to steal sensitive data via deceptive emails....

Internet Safety 2025-03-04

Internet Safety crossword puzzle
Across
  1. Testing Security For Images To Prevent Theft And Fakes secure from hackers, crooks, and internet thieves
  2. Make your posts 'friends only' so that only people you know get to see them. If you need to share your phone number or other private information with a friend, do so in a private message - not in a public post.
  3. Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet.
  4. Adults seeking to abuse children will go where kids are. As a result, grooming can theoretically happen just about anywhere online
  5. Never get into 'flaming' someone else on an online forum (ie. insulting them or getting into heated arguments)
  6. Privacy settings are configurations on digital platforms that allow users to control their personal information and how it is shared with others.
  7. After all, capital letters on the internet mean shouting and are generally considered impolite.
  8. While cybersecurity protects devices and networks from harm by third parties, Online Safety protects the people using them from harm by the devices and networks (and therefore third parties) through awareness, education, information and technology.
  9. Respect the privacy of others. This rule should be followed not only in everyday use of online
  10. A cookie is a piece of data from a website that is stored within a web browser that the website can retrieve at a later time.
Down
  1. November 2021) Flaming, also known as roasting, is the act of posting insults, often including profanity or other offensive language, on the internet.
  2. Never provide personal financial information, including your Social Security number, account numbers or passwords, over the phone or the Internet if you did not initiate the contact.
  3. Tell your children they do not have to accept any online activity meant to intimidate, threaten, tease, or harm them or anyone else
  4. recording someone being harassed or bullied in a way that usually involves physical abuse, then posting the video online for public viewing.
  5. Identity theft is the act of stealing a specific person's identifying information and then using it to pretend to be that particular individual. So identity theft can sometimes
  6. You can help limit the potentially damaging impact of your online presence by searching for yourself, setting alerts and tightening your privacy settings.
  7. A website that lets users keep a journal or diary on any subject they like and leave comments on other users' posts.
  8. An online predator is an individual who uses the Internet as a means to commit sexual abuse or harassment, specifically of children
  9. The use of hacking, malware attacks, or other cyber activity in which an unauthorized user attempts to access sensitive data or intellectual property
  10. a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.

20 Clues: Respect the privacy of others. This rule should be followed not only in everyday use of onlineAfter all, capital letters on the internet mean shouting and are generally considered impolite.Digital piracy refers to the illegal copying or distribution of copyrighted material via the Internet....

ICT Related Terms 2025-02-03

ICT Related Terms crossword puzzle
Across
  1. a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems Users are typically
  2. is a binary digit, the smallest increment of data on a computer.
  3. Browser It's a program on your computer that allows you to connect to the Internet to visit websites, download files, and applications.
  4. is a network device that both modulates and demodulates analog carrier signals (called sine waves) for encoding and decoding digital information for processing.
  5. - is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  6. short for "malicious software," refers to any intrusive software developed by cybercriminals (often called "hackers") to steal data and damage or destroy computers and computer systems.
  7. a range of frequencies within a given band, in particular that used for transmitting a signal, the transmission capacity of a computer network or other telecommunication system.
  8. is a type of malware that spreads copies of itself from computer to computer.
  9. is a malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising.
Down
  1. are text files with small pieces of data like a username and password that are used to identify your computer as you use a computer network.
  2. is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions.... It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
  3. is digital junk mail: unsolicited communications sent in bulk over the internet or through any electronic messaging system.
  4. the basic unit of information in computer storage and processing. A byte consists of 8 adjacent binary digits (bits), each of which consists of a 0 or 1....
  5. is the transmission of wide bandwidth data over a high-speed internet connection.
  6. an electronic communication setwork that connects computer networks and organizational computer facilities around the world used with except when being used attributively.
  7. stands for the Completely Automated Public Turing test to tell Computers and Humans Apart.
  8. the act or an instance of shutting down and restarting something (such as a computer or program).
  9. is the electronic holding place for the instructions and data a computer needs to reach quickly. It's where information is stored for immediate use.
  10. Wide Web is an information system where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hyperlinks, and are accessible over the Internet.
  11. Space is an amount of computer storage space on random-access memory devices, such as on a hard drive, floppy or USB flash drive.

20 Clues: is a binary digit, the smallest increment of data on a computer.is a type of malware that spreads copies of itself from computer to computer.is the transmission of wide bandwidth data over a high-speed internet connection.stands for the Completely Automated Public Turing test to tell Computers and Humans Apart....

Krzyżówka Angielski 2025-12-10

Krzyżówka Angielski crossword puzzle
Across
  1. The right to keep personal data protected.
  2. Learning skills or knowledge.
  3. Records of system activities.
  4. Studying information to understand it.
  5. Connected computers that share data.
  6. Instructions written for computers.
  7. A direct instruction given to a computer.
  8. The chance that something bad may happen.
  9. Use of technology to perform tasks without human input.
  10. A break in security where data is exposed.
  11. Rules about what is morally right or wrong.
  12. The ability to manage or direct something.
  13. A system on which applications can run.
  14. A tool that blocks unwanted network traffic.
  15. Continuous flow of data.
  16. A simplified digital structure used to predict or analyze.
  17. A tool used to explore or test a system.
  18. A call for data or a service.
  19. To follow the path of an action or data flow.
  20. Following laws, rules, or standards.
  21. Official rule made by authorities.
  22. Something unusual that may signal a problem.
  23. Monitoring to make sure rules are followed.
  24. Protection against threats or attacks.
  25. An event that disrupts normal operations.
  26. A saved copy of data in case of loss.
  27. A step taken to solve a problem.
  28. A set of rules for communication.
  29. Searching for threats inside a network.
  30. Proof of an event or action.
  31. A formal review of systems or processes.
  32. A prediction based on information.
  33. To watch or track activity.
  34. A request for information from a database.
  35. A user identity in a system.
Down
  1. A sign that danger or problems may occur.
  2. Unauthorized entry into a system.
  3. A formal rule or guideline.
  4. A document describing an event or findings.
  5. A specific area or internet address space.
  6. Long-term storage of old files.
  7. A computer that provides resources to others.
  8. A place where data is kept.
  9. A piece of hardware used in computing.
  10. Delay in data communication.
  11. A set of connected computer components.
  12. Someone who monitors or watches activity.
  13. Programs used by a computer.
  14. A risk or danger.
  15. Related to money or cost.
  16. A part of a larger software system.
  17. The way a system or user acts.
  18. Related to investigating cyber incidents.
  19. Accidental or unlawful release of information.
  20. To check a system for issues or threats.
  21. A connection point in a network.
  22. A secret code to access a system.
  23. Numerical information used for analysis.
  24. Belief that someone or something is reliable.
  25. A person or system chosen for attack.
  26. Too much data or activity for a system to handle.
  27. A weakness that can be exploited.
  28. Converting information into a secure code.
  29. The path data takes to reach a destination.
  30. Permission to use or enter a system.
  31. Measurements used to evaluate performance.
  32. Information stored or processed by computers.

67 Clues: A risk or danger.Continuous flow of data.Related to money or cost.A formal rule or guideline.A place where data is kept.To watch or track activity.Delay in data communication.Programs used by a computer.Proof of an event or action.A user identity in a system.Learning skills or knowledge.Records of system activities.A call for data or a service....

La unidad 10 2021-04-16

La unidad 10 crossword puzzle
Across
  1. counter
  2. confirm
  3. flight
  4. bathrooms(SP)
  5. customs
  6. security
  7. board
  8. takeoff
  9. late
Down
  1. window
  2. landing
  3. departures
  4. arrivals
  5. schedule
  6. luggage
  7. passport

16 Clues: lateboardwindowflightcounterconfirmlandingluggagecustomstakeoffarrivalsschedulesecuritypassportdeparturesbathrooms(SP)

Exam Vocabulary p7 2021-10-15

Exam Vocabulary p7 crossword puzzle
Across
  1. invloed
  2. armoede
  3. plaatselijk
  4. policy
  5. reclame maken
  6. gemeenschap
  7. regering
  8. maatregelen
  9. pesten
Down
  1. maatschappij
  2. dakloos
  3. politiek
  4. macht
  5. veiligheid
  6. omgeving
  7. gedrag

16 Clues: machtpolicygedragpestendakloosinvloedarmoedepolitiekomgevingregeringveiligheidplaatselijkgemeenschapmaatregelenmaatschappijreclame maken

เกมค้นหาคำศัพท์ 2025-08-03

เกมค้นหาคำศัพท์ crossword puzzle
Across
  1. บัตรโดยสาร
  2. ชั้นโดยสารราคาที่ถูกที่สุด
  3. ที่นั่ง
  4. พนักงานขนกระเป๋า
  5. เที่ยวบิน
  6. ถอดออก
  7. มาถึง
  8. ผู้โดยสาร
Down
  1. สายการบิน
  2. ขึ้นเครื่อง
  3. ระบบรักษาความปลอดภัย
  4. ออกเดินทาง
  5. ประตูทางออก
  6. เดินทาง
  7. สายพานที่ใช้รับส่งกระเป๋าในสนามบิน
  8. กระเป๋าเป้สะพายหลัง

16 Clues: มาถึงถอดออกที่นั่งเดินทางสายการบินเที่ยวบินผู้โดยสารบัตรโดยสารออกเดินทางขึ้นเครื่องประตูทางออกพนักงานขนกระเป๋ากระเป๋าเป้สะพายหลังระบบรักษาความปลอดภัยชั้นโดยสารราคาที่ถูกที่สุดสายพานที่ใช้รับส่งกระเป๋าในสนามบิน

Unit 5 - Do's and Don'ts 2020-02-02

Unit 5 - Do's and Don'ts crossword puzzle
Across
  1. Küche
  2. Parkplatz,Parkhaus
  3. Eigentum
  4. unbeaufsichtigt
  5. Gabelstapler
  6. Vorsicht
  7. Bibliothek
  8. Koch/Köchin
  9. Gehörschutz
  10. Strom
Down
  1. Sicherheit
  2. drogenfrei
  3. Boden,Fußboden
  4. Nichtraucherbereich
  5. hinterlassen,stehenlassen
  6. Schutzbrille
  7. zerbrechen,kaputtmachen
  8. Fall
  9. Schild
  10. Helm
  11. Lkw

21 Clues: LkwFallHelmKücheStromSchildEigentumVorsichtSicherheitdrogenfreiBibliothekKoch/KöchinGehörschutzGabelstaplerSchutzbrilleBoden,FußbodenunbeaufsichtigtParkplatz,ParkhausNichtraucherbereichzerbrechen,kaputtmachenhinterlassen,stehenlassen

unit 3 2020-12-10

unit 3 crossword puzzle
Across
  1. biztonsági ellenörzés
  2. helyszin
  3. érkezés (repülőtéren)
  4. mennyország
  5. konferencia
  6. vám
  7. jóslat
  8. táblák, jelzések
  9. foglalás
Down
  1. poggyászszállító kocsi
  2. mostanában
  3. kapu
  4. tetőterasz
  5. indulás
  6. okostelefon
  7. egzotikus
  8. csengőhang
  9. utas
  10. beszáll ( a repülőgépbe)
  11. szöveges üzenetet küld

20 Clues: vámkapuutasjóslatinduláshelyszinfoglalásegzotikusmostanábantetőteraszcsengőhangmennyországkonferenciaokostelefontáblák, jelzésekbiztonsági ellenörzésérkezés (repülőtéren)poggyászszállító kocsiszöveges üzenetet küldbeszáll ( a repülőgépbe)

Travel, holiday 2020-01-12

Travel, holiday crossword puzzle
Across
  1. utazás
  2. jegy
  3. érkezés
  4. foglalás
  5. csomag
  6. indulás, indulási oldal
  7. kilátás
  8. városnézés
  9. szállás
  10. luxushajó, óceánjáró
  11. peron
  12. ellenörzés, biztonsági szolgálat
Down
  1. leszállás
  2. rom, lerombol
  3. útlevél
  4. tengerpart
  5. pihenés, kikapcsolódás
  6. külföld
  7. szórakozás, szórakoztató program
  8. felfedez

20 Clues: jegyperonutazáscsomagútlevélérkezéskülföldkilátásszállásfoglalásfelfedezleszállástengerpartvárosnézésrom, lerombolluxushajó, óceánjárópihenés, kikapcsolódásindulás, indulási oldalszórakozás, szórakoztató programellenörzés, biztonsági szolgálat

Theme 2 Crime 2024-11-16

Theme 2 Crime crossword puzzle
Across
  1. gerechtigheid
  2. advocaat
  3. verzamelen
  4. indringer
  5. dankbaar
  6. oplossen
  7. steng
  8. zakkenrollen
  9. opgelucht
  10. voorkomend
  11. veroordeling
Down
  1. rechtszaak
  2. dador
  3. beveiliging
  4. financiering
  5. veronderstellen
  6. ontwetendheid
  7. aanval
  8. getuige
  9. afkickkliniek
  10. bewijs
  11. rel
  12. rechtzaak
  13. hechtenis

24 Clues: reldadorstengaanvalbewijsgetuigeadvocaatdankbaaroplossenindringeropgeluchtrechtzaakhechtenisrechtszaakverzamelenvoorkomendbeveiligingfinancieringzakkenrollenveroordelinggerechtigheidontwetendheidafkickkliniekveronderstellen

POIST 2025-12-15

POIST crossword puzzle
Across
  1. computer progammer
  2. businessperson
  3. scientist
  4. judge
  5. doctor
  6. secretary
  7. electrician
  8. salesperson
  9. nurse
Down
  1. singer
  2. computer technician
  3. security guard
  4. plumber
  5. musician
  6. web developer
  7. banker
  8. teacher
  9. cleaner
  10. engineer
  11. driver
  12. mechanic
  13. farmer

22 Clues: judgenursesingerbankerdoctordriverfarmerplumberteachercleanermusicianengineermechanicscientistsecretaryelectriciansalespersonweb developersecurity guardbusinesspersoncomputer progammercomputer technician

WRS 15 & 16 - DA Puzzle 2023-12-01

WRS 15 & 16 - DA Puzzle crossword puzzle
Across
  1. data converted into a meaningful and useful context
  2. malware disguised as a trusted source that convinces the user to open a link or an attachment and install itself.
  3. using the Internet for anything other than work tasks
  4. includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network; usually requires the user to initiate by unwittingly installing the malicious software
  5. the level one exposes one's self or professional network to unethical intentions (e.g., end-user attacks, server-side attacks)
  6. pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
  7. to support with evidence or authority; to make more certain
  8. a particular preference or point of view that is personal, rather than scientific.
  9. malware that accesses or controls a device without being detected
  10. a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system
  11. something that furnishes proof
  12. the protection of information systems against unauthorized access (e.g., hacking, identity theft)
  13. believable; reliable
  14. a flaw or weakness that allows a threat agent to bypass security
  15. a formal document with which many organizations require employees to comply, addressing the separation of personal and workplace use of the Internet, email etiquette, and security measures and safeguards that employees must obey.
  16. using online services and social networking ethically, by being a good online citizen, by adhering to privacy and safety guidelines, and by facilitating thoughtful and considerate communication with others
  17. a website that allows people of similar interests to interact and exchange information that is typically personal
Down
  1. the ability to figure out the type of information you need, find that information, evaluate it, and properly use it
  2. connected with or related to the matter at hand
  3. unbiased; neutral
  4. using the Internet, ethically, for work-related tasks
  5. a server-side attack that allows hackers to be able to target vulnerabilities on any site you use to login, then they apply that same login information to other major consumer sites to see if you reused your login and password
  6. unethical and often unnoticed attacks by others in the public sphere when operating online (e.g., malware, phishing, Trojan horse, virus, worm, spam, rootkit)
  7. the unethical distribution of mass digital messages. This is the main way that malware is opened and spread
  8. cyber attack that targets the server side to get customer information from the database, such as credit card numbers
  9. book, article, person, or other resource consulted for information.
  10. examine and judge carefully
  11. attacks focused on the workplace Network workers access.
  12. malware that spreads by users from an infected device to the rest of the devices on a network/system

29 Clues: unbiased; neutralbelievable; reliableexamine and judge carefullysomething that furnishes proofconnected with or related to the matter at handdata converted into a meaningful and useful contextusing the Internet, ethically, for work-related tasksusing the Internet for anything other than work tasks...